eavesdropping

Latest

  • Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds

    by 
    Darren Murph
    Darren Murph
    12.29.2010

    It's hardly a fresh idea -- researchers have claimed that GSM calls could be cracked and listened in on for years. But there's a difference between being able to do something with a $50,000 machine and a warrant, and being able to do the same thing with a few $15 Motorola phones, a laptop, open source software and 180 seconds of spare time. Security Research Labs researcher Karsten Nohl and OsmocomBB project programmer Sylvain Munaut recently spoke about a new GSM hack at the Chaos Communication Conference in Berlin, and they were able to walk the audience through the eavesdropping process in a matter of minutes. According to them, it's not terribly difficult to use a $15 handset to "sniff out" location data used to correctly route calls and texts, and once you've nailed that down, you could use modified firmware to feed raw data into a laptop for decryption. Using a 2TB table of precomputed encryption keys, a cracking program was able to break in within 20 seconds -- after that, you're just moments away from recording a live GSM call between two phones. Of course, speeches like these are made to encourage security officials to beef up the layers between you and ill-willed individuals, but it's hard to say what (if anything) will change. For now, we'd recommend just flying to each and every person you'd like to speak with. Unless you live in the Greater New York area -- you're probably better off risking a hacked conversation than heading out to LGA / JFK / EWR.

  • Microsoft exec caught in privacy snafu, says Kinect might tailor ads to you

    by 
    Sean Hollister
    Sean Hollister
    11.15.2010

    Microsoft's Dennis Durkin voiced an interesting idea at an investment summit last week -- the idea that the company's Kinect camera might pass data to advertisers about the way you look, play and speak. "We can cater what content gets presented to you based on who you are," he told investors, suggesting that the Kinect offered business opportunities that weren't possible "in a controller-based world." And over time that will help us be more targeted about what content choices we present, what advertising we present, how we get better feedback. And data about how many people are in a room when an advertisement is shown, how many people are in a room when a game is being played, how are those people engaged with the game? How are they engaged with a sporting event? Are they standing up? Are they excited? Are they wearing Seahawks jerseys?Needless to say, sharing this level of photographic detail with advertisers presents some major privacy concerns -- though it's nothing we haven't heard before -- but moreover it's explicitly against the privacy policy Microsoft presents Kinect users. "Third party partners use aggregated data to deliver Kinect experiences (games or applications), to understand how customers use their Kinect experiences, and to improve performance or even to help plan new experiences," the Kinect Privacy and Online Safety FAQ reads, but also "They are not permitted to use the information for marketing purposes such as selling you games or services, or for personalizing advertising" (bolding ours). In an email to the Wall Street Journal, Microsoft flatly denied that the Kinect would do anything of the sort, whether via third-party partners or otherwise. "Xbox 360 and Xbox LIVE do not use any information captured by Kinect for advertising targeting purposes," representatives wrote. Honestly, some of us at Engadget still think targeted advertising is kind of neat, but we know how seriously you take this stuff.

  • Hacker intercepts phone calls with homebuilt $1,500 IMSI catcher, claims GSM is beyond repair

    by 
    Sean Hollister
    Sean Hollister
    07.31.2010

    In 2009, Chris Paget showed the world the vulnerabilities of RFID by downloading the contents of US passports from the safety of his automobile. This year, he's doing the same for mobile phones. Demonstrating at DefCon 2010, the white hat hacker fooled 17 nearby GSM phones into believing his $1,500 kit (including a laptop and two RF antennas) was a legitimate cell phone base station, and proceeded to intercept and record audience calls. "As far as your cell phones are concerned, I'm now indistinguishable from AT&T," he told the crowd. The purpose of the demonstration was highlight a major flaw in the 2G GSM system, which directs phones to connect to the tower with the strongest signal regardless of origin -- in this case, Paget's phony tower. The hacker did caveat that his system could only intercept outbound calls, and that caller ID could tip off the owner of a handset to what's what, but he says professional IMSI catchers used by law enforcement don't suffer from such flaws and amateur parity would only be a matter of time. "GSM is broken," Paget said, "The primary solution is to turn it off altogether." That's a tall order for a world still very dependent on the technology for mobile connectivity, but we suppose AT&T and T-Mobile could show the way. Then again, we imagine much of that same world is still using WEP and WPA1 to "secure" their WiFi.

  • Spy Ear power strip lets you listen from the floor

    by 
    Nilay Patel
    Nilay Patel
    06.01.2009

    Yeah, it's not the wildest power strip design we've ever seen, but the Spy Ear has a secret: a hidden SIM card slot and cell radio that allows you to monitor what's happening in your absence. Just dial in and listen away -- we're not sure how much you'll hear from the usual places a power strip is hidden, but it'll be better than nothing, nosy.[Via Red Ferret]

  • Keyboard "eavesdropping" just got way easier, thanks to electromagnetic emanations

    by 
    Paul Miller
    Paul Miller
    10.20.2008

    We always knew those electromagnetic emanations would amount to no good, and now here they go ruining any shred of privacy we once thought to possess. Some folks from the Security and Cryptography Lab at Switzerland's EPFL have managed to eavesdrop on the electromagnetic radiation shot off by shoddy wired keyboards with every keystroke. They've found four different ways to listen in, including one previously-published general vulnerability, on eleven keyboard models ranging from 2001 to 2008, with PS/2, USB and laptop keyboards all falling to at least one of the four attacks. The attack works through walls, as far as 65 feet away, and analyzes a wide swath of electromagnetic spectrum to get its results. With wireless keyboards already feeling the sting of hackers, it's probably fair to say that no one is safe, and that cave bunkers far, far away from civilization are pretty much our only hope now. Videos of the attacks are after the break.[Thanks, Dave]

  • Vintage Mr. Microphone hacked into spy device

    by 
    Darren Murph
    Darren Murph
    06.16.2008

    We've seen the viewfinder of a VHS camcorder hacked into a night-vision headset, but this just might be even more retro than that. For those old seasoned enough to remember Ronco's Mr. Microphone, you may recall just how boring it became after a few short minutes of use. If you somehow managed to not discard the thing over the years, we've found the perfect use for it: a discrete spying device. Essentially, DIYers can strip the innards out, re-solder a few pieces and shove the resulting tidbits into an unassuming air freshener. From there, just tune to whatever open frequency you can find and you've got yourself a wireless eavesdropping tool like no other. Video after the break.

  • Vortex's wall climbing robot peeks in windows

    by 
    Darren Murph
    Darren Murph
    06.29.2007

    While not the first wall climbing machine we've come across, Vortex's VRAM Mobile Robot Platform (VMRP) machine weds ascension and undercover surveillance in fine fashion. Aimed at law enforcement tasks, military missions, and fanatical hobbyists, this clinger is remotely controlled with the capacity to add "onboard intelligence and sensors to monitor VMRP status and health." It utilizes a vortex vacuum to suction itself to vertical surfaces, and then relies on the wheels to get it movin'. Moreover, this bot was built to withstand mild weather hazards and communicate wirelessly back to the user, and its ability to wield microphones, video cameras, and proximity sensors make this the ultimate eavesdropping tool. Sadly, we've no idea how much it'd take to get one of these in your needy palms, but free free to indulge in the video waiting after the break.[Via OhGizmo]

  • QSTARZ BT-Q1000 GPS data logger syncs with Google Earth

    by 
    Darren Murph
    Darren Murph
    06.15.2007

    QSTARZ is taking its familiarity with GPS receivers and integrating a data logger to form the newfangled BT-Q1000. This two-faced device doubles as a Bluetooth GPS receiver to navigate your course and allows you to "record your routes" in order to plot points on Google Earth and disseminate the map to your envious pals. Moreover, you can use the device to more accurately tag where your travel photos were snapped along the way, and if you're in the fleet management biz, this here tool can keep your motorists from straying too far off the beaten path. Designed to last a whopping 32-hours without a recharge, the BT-Q1000 can make your next journey a whole lot more memorable for $119 when it lands later this month.

  • Logitec intros digital recorder for consumer telephones

    by 
    Darren Murph
    Darren Murph
    06.13.2007

    Personal voice recorders simply aren't likely to start up any serious controversy anytime soon, but Logitec's latest spin on taping audio just might raise a few hairs. The LIC-TRA056SD is a "private telephone recorder" that plugs right into your home phone and captures conversations conveniently on the built-in 128MB of storage. If those 50 hours of capacity aren't enough to catch someone red handed, you can also throw in a spare SD card and create an audio archive of every phone call you'll ever make. Additionally, the USB connectivity ensures that extracting dubious MP3 / WAV files won't be a chore, and considering that everything looks to be password protected, the digital eavesdropping crowd will be out of luck. Unfortunately, there's no word just yet on how much this dodgy device will run you, but it should hit the shelves of Japan before the month's end.[Via AkihabaraNews]

  • KTF's surveillance canine beams snapshots via HSDPA

    by 
    Darren Murph
    Darren Murph
    04.21.2007

    It just makes sense that the same Korean provider that offered up a pet translator service would attempt to give back to the owners, as KTF has launched a robotic puppy that just melts the hearts of gizmo-lovin' gals abroad. Specifically, it garners a crowd of individuals wherever it's at, and then pulls double duty as an undercover surveillance agent, snapping mobile images and channeling them straight to your cellphone via HSDPA. For the paranoid 'rents in the crowd, this here ought to be a perfect way to monitor what really goes down in the house while you're away for the weekend, and while it's no guard dog per se, the evidence this bad boy captures could indeed be quite frightening. [Warning: Read link requires subscription]

  • Laptops and flat panels also vulnerable to Van Eck eavesdropping

    by 
    Darren Murph
    Darren Murph
    04.21.2007

    Those who wander into the realms of spying, phreaking, and dubious eavesdropping are likely familiar with Wim Van Eck, but for those new to remote screen-grabbing scene, you should probably take note. Back in the day, Mr. Eck "proved it was possible to tune into the radio emissions produced by electromagnetic coils in a CRT display and then reconstruct the image," effectively rending the images on a distant monitor without the user knowing. Now, however, a modern day guru in his own right has found that the methodology used in 1985 can still be potent today, albeit on laptops and flat panel LCDs. Markus Kuhn has since discovered that by tuning into the radio emissions produced by the cables running into a monitor, hackers can garner the pixels one at a time, and carefully stack them together to form a picture of someone else's screen. Reportedly, Markus was able to "see a PowerPoint presentation from a stand 25 meters away (pictured)," and he also noted that laptops with metal hinges were particularly good targets as they tended to broadcast the necessary signals quite well. Of course, we aren't encouraging the act of on-screen voyeurism without appropriate consent, but if you're interested in seeing what's behind the (faraway) LCD, be sure to hit the read link and push aside those morals for a moment. [Warning: PDF read link][Via Slashdot]

  • This Nokia N95 is listening

    by 
    Chris Ziegler
    Chris Ziegler
    04.15.2007

    So we get the Big Brother / CIA / James Bond appeal of a phone that sends all ambient audio, phone calls, and text messages to a third party; we really do. What we can't fathom, though, is what circumstance would lead to you giving a frickin' N95 to someone you're trying to spy on. If you're trying to spy on them, that presumably means that you're not on the best of terms -- and frankly, if we got a $1,000 handset from an enemy of ours with no strings attached, we'd be just a tad suspect of the device. Anyhoo, if you've got money to burn and privacy to violate, this Nokia N95 specially equipped with "Interceptor Software" will keep you in the loop on any form of communication its user engages in. Oh, and at £2,300 (about $4,560), you'd better really need to eavesdrop.[Via SCI FI Tech]

  • Korean carriers to offer anti-eavesdropping service

    by 
    Darren Murph
    Darren Murph
    01.16.2007

    Just as Japan announces that it'll pretty much have an eye on every single cellphone user in the nation, Korea is going against the grain somewhat by offering up an anti-eavesdropping service on users' handsets. SK Telecom, KTF, and LG Telecom will all be offering private long code service, a digital encryption system to keep voice snoopers at bay, and will dub the service "Voice Private." Marketed primarily towards people of utmost importance, such as politicians, public officials, journalists (ahem), and CEOs, the luxury will purportedly operate on any mobile phone and will cost between W1,500 ($1.60) and W2,000 ($2.13). Interestingly, it wasn't noted if these fees were a monthly charge (less likely) or a per-call exaction (more likely), but regardless, the service should go live just as soon as the Ministry of Information and Communication approves it.

  • "Love Detector" service now available for mobile matchmaking

    by 
    Evan Blass
    Evan Blass
    05.04.2006

    We're not quite sure that the type of person who uses Nemesysco Entertainment's home or PocketPC (pictured) versions of the "Love Detector" service is out and about all that much, but the Israeli company has nonetheless released a mobile alternative that lets you discover your crush's innermost feelings while chatting on your cellphone. Already "wildy popular" in Israel, "Love Detector" allows you to dial a certain number before calling your intended target sweetie so that the company's server (and no snickering employees, we're certain) can eavesdrop on the coversation and calculate (with deadly accuracy, we're certain) four key parameters that supposedly determine your chances of mating. After the call is over (or the other person hangs up on you), the server delivers a text message to your phone that helpfully breaks the complicated analysis down into plain English, and even more helpfully, offers advice on how to proceed ("Love is detected! Proceed with caution!" or "Never call this person again, you perv."). Besides Israel, the precision service is unfortunately (?) only available in Turkey, Hungary, and the UK for now, but we're sure that once our US readers begin deluging Nemesysco with pleading emails, they'll have a version for the States in no time.[Via Shiny Shiny and Gizmos for Geeks]