A computer-security researcher warned mobile-device users that spies do not need the sweeping government powers of the National Security Agency to track their movements around a city; instead, a system of cheap sensors and a backend analysis system will do the job quite well.
Dubbed CreepyDOL, the system uses a combination of inexpensive wireless sensors and analysis algorithms to allow researcher Brendan O’Connor, also a law student at the University of Wisconsin at Madison, to track his own movements around a city as well as gathering additional data on the information that mobile applications regularly transmit without any encryption or other security. Apple iPhones, for example, regularly broadcast their operating systems versions, their MAC addresses, and other information that makes them – and their users – easy to identify.
“We are leaking too much data for random reasons,” O’Connor said in a presentation. He had recorded shopping, dating and other applications that sent out the operating system version, application version and even GPS coordinates over Wi-Fi. “There is no good reason to send this data out unsecured.”
Each F-Bomb sensor costs about $57 (£37) in parts to build, he said.
“There is nothing in this that is not sold in every country across the world,” he said.
The sensors will connect to local open Wi-Fi networks, accepting any click-wrap agreement by automatically clicking accept buttons. The sensors then connect to the Tor network to anonymise their traffic and send back information collected from any local targets for analysis. Each sensor also does local processing to reduce the massive packet captures to specific information, such as the identity of the target, their location, and what apps they are using.
“We are not bringing our own bandwidth to the party,” O’Connor said. “We are using the bandwidth available locally.”
The data is shipped back through the open networks to two databases that allow for fast querying and analysis. To further make the system easy to use, O’Connor used the Unity game engine to build a visualisation programme that plotted each report from a mobile device on a local map, allowing the eavesdropper to track the target through the city.
While the system could have collected a lot more interesting data on actual mobile users, O’Connor could not use it to eavesdrop on other people’s communications because the government recently prosecuted and convicted Andrew Auernheimer, known as “Weev” to many on the Internet, for a similar action. Weev is serving a 41-month sentence, although his conviction is under appeal.
O’Connor called for better protections for security researchers. Without such protections, security research will be extremely limited in an age where most systems are not under a researchers’ control, he said.
“We no longer have any assurances that we can do anything to a system,” he said.
Are you a security pro? Try our quiz!
Originally published on eWeek.
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…
View Comments
Obvious solution is to switch off the Wi-Fi phone connection - other advantage gives a great improvement in battery life.