A computer-security researcher warned mobile-device users that spies do not need the sweeping government powers of the National Security Agency to track their movements around a city; instead, a system of cheap sensors and a backend analysis system will do the job quite well.
Dubbed CreepyDOL, the system uses a combination of inexpensive wireless sensors and analysis algorithms to allow researcher Brendan O’Connor, also a law student at the University of Wisconsin at Madison, to track his own movements around a city as well as gathering additional data on the information that mobile applications regularly transmit without any encryption or other security. Apple iPhones, for example, regularly broadcast their operating systems versions, their MAC addresses, and other information that makes them – and their users – easy to identify.
“We are leaking too much data for random reasons,” O’Connor said in a presentation. He had recorded shopping, dating and other applications that sent out the operating system version, application version and even GPS coordinates over Wi-Fi. “There is no good reason to send this data out unsecured.”
Each F-Bomb sensor costs about $57 (£37) in parts to build, he said.
“There is nothing in this that is not sold in every country across the world,” he said.
The sensors will connect to local open Wi-Fi networks, accepting any click-wrap agreement by automatically clicking accept buttons. The sensors then connect to the Tor network to anonymise their traffic and send back information collected from any local targets for analysis. Each sensor also does local processing to reduce the massive packet captures to specific information, such as the identity of the target, their location, and what apps they are using.
“We are not bringing our own bandwidth to the party,” O’Connor said. “We are using the bandwidth available locally.”
The data is shipped back through the open networks to two databases that allow for fast querying and analysis. To further make the system easy to use, O’Connor used the Unity game engine to build a visualisation programme that plotted each report from a mobile device on a local map, allowing the eavesdropper to track the target through the city.
While the system could have collected a lot more interesting data on actual mobile users, O’Connor could not use it to eavesdrop on other people’s communications because the government recently prosecuted and convicted Andrew Auernheimer, known as “Weev” to many on the Internet, for a similar action. Weev is serving a 41-month sentence, although his conviction is under appeal.
O’Connor called for better protections for security researchers. Without such protections, security research will be extremely limited in an age where most systems are not under a researchers’ control, he said.
“We no longer have any assurances that we can do anything to a system,” he said.
Are you a security pro? Try our quiz!
Originally published on eWeek.
CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
View Comments
Obvious solution is to switch off the Wi-Fi phone connection - other advantage gives a great improvement in battery life.