Researcher Demonstrates DIY Eavesdropping System

A computer-security researcher warned mobile-device users that spies do not need the sweeping government powers of the National Security Agency to track their movements around a city; instead, a system of cheap sensors and a backend analysis system will do the job quite well.

Dubbed CreepyDOL, the system uses a combination of inexpensive wireless sensors and analysis algorithms to allow researcher Brendan O’Connor, also a law student at the University of Wisconsin at Madison, to track his own movements around a city as well as gathering additional data on the information that mobile applications regularly transmit without any encryption or other security. Apple iPhones, for example, regularly broadcast their operating systems versions, their MAC addresses, and other information that makes them – and their users – easy to identify.

Data leak

“We are leaking too much data for random reasons,” O’Connor said in a presentation. He had recorded shopping, dating and other applications that sent out the operating system version, application version and even GPS coordinates over Wi-Fi. “There is no good reason to send this data out unsecured.”

The CreepyDOL system is based on an inexpensive sensor that can be plugged into a wall, tossed up onto a roof, or even dropped from a radio-controlled plane. Because of its ability to be dropped from the air, O’Connor dubbed it the F-Bomb sensor. The sensors, which are black boxes a bit bigger than a deck of cards, monitor local Wi-Fi communications for unencrypted data, gathering information about each user from their mobile device.

Each F-Bomb sensor costs about $57 (£37) in parts to build, he said.

“There is nothing in this that is not sold in every country across the world,” he said.

The sensors will connect to local open Wi-Fi networks, accepting any click-wrap agreement by automatically clicking accept buttons. The sensors then connect to the Tor network to anonymise their traffic and send back information collected from any local targets for analysis. Each sensor also does local processing to reduce the massive packet captures to specific information, such as the identity of the target, their location, and what apps they are using.

“We are not bringing our own bandwidth to the party,” O’Connor said. “We are using the bandwidth available locally.”

Target tracking

The data is shipped back through the open networks to two databases that allow for fast querying and analysis. To further make the system easy to use, O’Connor used the Unity game engine to build a visualisation programme that plotted each report from a mobile device on a local map, allowing the eavesdropper to track the target through the city.

While the system could have collected a lot more interesting data on actual mobile users, O’Connor could not use it to eavesdrop on other people’s communications because the government recently prosecuted and convicted Andrew Auernheimer, known as “Weev” to many on the Internet, for a similar action. Weev is serving a 41-month sentence, although his conviction is under appeal.

O’Connor called for better protections for security researchers. Without such protections, security research will be extremely limited in an age where most systems are not under a researchers’ control, he said.

“We no longer have any assurances that we can do anything to a system,” he said.

Are you a security pro? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

View Comments

  • Obvious solution is to switch off the Wi-Fi phone connection - other advantage gives a great improvement in battery life.

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

2 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

5 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

7 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

22 hours ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

1 day ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

1 day ago