Hacker News new | past | comments | ask | show | jobs | submit login
A Cheap Spying Tool With a High Creepy Factor (nytimes.com)
119 points by jzwinck on Aug 3, 2013 | hide | past | favorite | 83 comments



This reminds me of the comment from the NSA a while ago in which it said that Snowden's documents have already changed many people's behaviour. I'm on a reliable 4G network in London and (mostly) only go to places I'm familiar with. The result being that location service, WiFi, Bluetooth and NFC are permanently turned off. My girlfriend has had location services turned off since she first got an iPhone 3GS. And she won't let me use my Kinect when she's home.

Justified or not, these things are coming up in conversation at work and with friends a lot lately, which I find encouraging.


When the Snowden documents were released, I got into a heated debate with a friend, who argued that he has nothing to hide.

He said he couldn't believe anyone was naïve enough to think the government wasn't monitoring everything already, and that we elected them, so we should trust them. He said that privacy concerns sound pretty trivial compared to preventing incidents like the Boston Marathon bombings or apprehending the suspects, and that he'll gladly cooperate to help stop the bad guys.

We pretty much ruined lunch for everyone with our arguing, but he has since spent more time looking into the nuances of the topic and has said he has changed his mind. The thought of not being able to trust the government is really depressing to him.


When the Snowden documents were released, I got into a heated debate with a friend, who argued that he has nothing to hide.

I heard Bruce Schneider being interviewed, and he said that people frequently challenge him by saying they have nothing to hide. His two-second retort, especially on call-in shows, is simple: "What's your salary?"

No one wants to answer in public.


I can list sooo many things people would want to hide:

- Salary

- Medical history

- Home address

- Phone number

- DOB

- SS number

- Bank account numbers

- Passwords

- Photos of yourself

- Photos of your children

- Job search history (when you are already employed)

- What time you'll be out of the house

- Porn search history


It's because you can't give that information out without also granting write access to a person's life.

If there were a way I could give you my SSN/bank information/etc without also granting you the ability to impersonate me, I'd gladly do it.


Yep, but that's only true for some of those things. Others, like salary and photos of your kids, have other reasons for staying hidden (impact on social situations and safety).


Eh, if I didn't think my company would be upset with me telling you what I make, I'd let you know. It's not a big deal to me. You could probably figure it out based on where I live and what I do with my free time anyway.

As for pictures of my kids, I don't have any. But it's a pretty terrible argument because it perpetuates the false idea that you must want to hide something for privacy to be necessary.

I'd bet large sums of money Bruce Schneier has never used this line of defense against the "nothing to hide" argument.


If you work somewhere that's anything like places I've ever worked, then I think knowing your salary might have a bigger impact on some of your colleagues than you might think, eventually causing some blowback to come your way. Just my observation from past experience.


Yeah I know, but that's not my burden, that's theirs.


I'd also like to point out that I promised not to give that information away, and regardless of the privacy implications, I can't in good consciousness break my own word.


Hiding salary information is usually because it can often create awkward tension in your social groups. Like if your poor friends or family know you make a lot more money than you let show.

I know it's not the only reason for privacy, but it's a common and significant one.


Adultery, casual drug use, problems with drinking, what you said about your boss e.g he's a jerk, and a million other stuff.


Ironically, if you pay taxes, that's something the government doesn't even have to spy on you for.


Fun fact: In Norway, everyone's salary is public :)

(Well, technically, the amount of taxes paid is public, from which you can make a good guess at salary)


Nah man, doesn't always work. Whe I tried that, they said "Nothing to hide from the government, not everyone."


Then tell them: "You're uninteresting then, it's not about you".

And add:

"Interesting people that shake up the status quo and make this world a better place, from Ghandi to MLK, HAVE had lots of stuff to hide from the government".

"Not to mention that in your shallow mind you only imagine an ever benevolent government. Would you have something to hide if Anna Frank's family asked to stay in your apartment?"


> The thought of not being able to trust the government is really depressing to him.

And that's how a libertarian anarchist comes to be.


>I got into a heated debate with a friend, who argued that he has nothing to hide

Find out something embarrasing about said friend, and ask it if it's ok to post in on Facebook.


If you seriously have nothing to hide, you're boring. That might be worth hiding.


Do you trust the government with nuclear weapons?


Not just no, but hell no.


Why? The 4g network is tracking you via cell town triangulation the whole time anyway. Might as well use the phones wifi when you can save some bandwidth on the slower cellular network.


Maybe I'm an ass for pointing this out, but it's trilateration, not triangulation. I set out to learn the mathematical concept, and not knowing the right term had me waste an entire evening looking at something more closely related to tessellation, than spatial position locating.


You don't sound like an ass at all. Hell, if I had wasted the better part of an evening due to a simple nomenclature mix-up, I'd post it as well when the right concept comes up. It might save others some time.


Funny thing is I'm really familiar with the tech - I did COIN in the bush war in Angola, where we did a lot of triangulation (old school, using an oscilloscope). I've given up trying to explain the difference.


Because GSM, GPS and WiFi combined are, bar GPS, more accurate and pervasive together than any one in isolation. Also because when location services are off, photos don't get tagged with my location coordinates, and apps can't use my location either.


Location services are configurable per-app in iOS 6, so you can have Maps allowed to use them and Camera forbidden.

(Settings -> Privacy -> Location).


Android can do that too, I believe. I have a Windows Phone. Settings aren't that granular.


A Windows Phone App which uses the Location Service is required to have a setting to enable/disable the use of this service[1].

It's probably not as comfortable as the solutions of iOS/Android, but it gets the job done.

http://msdn.microsoft.com/en-us/library/windowsphone/develop... - 2.7.3


Won't let you use the Kinect? Paranoid.


Paranoia would imply fear of something unlikely to happen.

http://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/


It is unlikely to happen, that link is silly fearmongering. Wired should be fined for publishing it.


PRISM was "unlikely to happen" too. The ability to conduct surveillance through consumer devices, however, is something that already exists (cell phones [1]). Given that the NSA record private phone conversations en masse, as well as many other types of data, why would you assume it "silly fearmongering" to suggest that they'll continue to develop and improve their system's capabilities?

[1] http://news.cnet.com/2100-1029-6140191.html


I'm using your words, it's not a matter of "likeliness", it's simply a thing of which we have zero evidence or indication that it is going to occur.

So yes, I do think it is "silly fearmongering" to suggest that they'll continue to develop and improve their system's capabilities in the specific way you're suggesting.


>I do think it is "silly fearmongering" to suggest that they'll continue to develop and improve their system's capabilities in the specific way you're suggesting.

Why would they not exploit a capability that they have indicated interest in exploiting given that they've already crossed the line into illegally collecting as much private information as they can?

They sold the AT&T facilitated phone tapping as something they would do selectively, with FISA warrants. It turns out they were conducting mass collection of conversations and conversation-related data without warrants. Why would they show restraint with the ability to listen through consumer devices? Talking about scenarios that are likely to happen isn't "fearmongering" it's rational vigilance given where we're at.


Why won't they? Because they can't, is why. It's not technically or politically feasible.

It's "silly fearmongering" as long as you have no evidence that they've done such a thing or are attempting to do such a thing.


How is it not technically possible to collect information from consumer devices that are connected to the Internet and where the vendors cooperate to provide backdoors (as they do with cell phones)? As for politically feasible, it isn't politically feasible for them to collect everyone's communication via PRISM, yet they are doing it.

Preventing government abuses means paying attention to not just what they've already proven to have done, but also attempting to discourage them from taking likely next steps.


Fined for publishing a story?


For yelling, "Fire!" in a crowded theater.


It's pretty slopping thinking to conflate reporting/analysis based on what public officials have said with inducing a deliberate panic by lying.


My whole assertion is that they've done none of the former.


They've done no reporting/analysis?

They reported a CIA officials stated interest in using consumer devices for intelligence gathering. Their analysis of that was to presume it would be abused.

It may not be deep reporting or analysis, but your suggestion that they should be fined would be more in line with how Russia runs things than the media culture of the West.


Yes, it's not deep, and it's not Russia, it's Canada[0]. This reporting is very misleading.

[0] http://readersupportednews.org/opinion2/276-74/5123-fox-news...


The "lies" they're talking about are willful fabrications, not speculative analysis.

Fox News deliberately aired lies about the contents of milk in the US. They went to court to defend their right to lie.

http://www.relfe.com/media_can_legally_lie.html


I'm saying their speculative analysis is approaching (and surpassing) the line between "analysis" and "fabrication", and they should be punished for it.


Name calling? Mean and stupid.


A natural human response though, so I accept it. That said, my girlfriend finds it creepy that there's a machine under the TV that recognises her, and tracks her movements. I accept that too.


What you did is name-calling. What I did was identify a pathological behavior and give my opinion that it's unnecessary.


No, what I did was identify a pathological behavior and give my opinion that it's unnecessary!


That's not what you did.


Something we aren't noticing is, if he can build one that small with off the shelf parts, the NSA could and probably does have devices like these as small as quarters or perhaps embedded in dummy iPhone charging cubes. I would bet the Feds can build out miniature versions for a few hundred bucks a piece. Which in defense dollars means they are disposable.


The article also mentions that Weev exploited a security hole in AT&T's servers; a complete misunderstanding and/or misrepresentation of the truth.


What is the truth?


If I'm not mistaken, a bunch of GET requests against a public API, unfortunately setup to not require authorization credentials and yet still exposing nominally 'private' data.

Nuance is a hell of a thing.


That's correct. It was basically:

    wget http://att.com/obscure/url?id={1..114000}
Aaaaand that's a prison sentence.


114,000 '200 OK' responses = 41 months in prison.


16 minutes in prison per request.


This is a collection of media buzz words strung together to create an article, it's about as insightful as claiming that network analysers can spy on network data.

I wonder why he only used one pi per channel though, I think they have the horsepower to sniff perhaps three.


The USB power is very very low with them. Even one is pushing it reall, any more would need a bulky powered hub.


Since the Pi takes 5V just like any USB device, he could re-use the same power adapter and just get a splitter USB cable; he didn't need a full blown powered USB with its own power adapter.


Can anyone give a technical account of how this is achieved?

The article makes it sound as though it relies on unsecured wifi data, but also states that "Even when he didn’t connect to a Wi-Fi network, his sensors could track his location through Wi-Fi “pings.”" It also talks about iMessage, and dropbox, and other application layer data.

I couldn't make sense of it.


iPhones are very "chatty" when not connected to a WiFi access point. They repeatedly try to find access points they have connected to before - broadcasting both their MAC address and the SSID of prior access points.

Android phones are completely silent even with the WiFi on when not connected to an access point.


I don't think they'll be silent any more unless you turn off 4.3's "Allow scanning by services" option.


They'll still be silent: "Allow scanning by services" is listen-only with no transmission.


Yep, this is a good explanation of it. Another thing he mentioned was that even if you have VPN enabled, the first few pings from dropbox, iMessage, etc. actually aren't getting sent through the VPN.


Presumably, the location tracking is just a variant of the Wi-Fi-based positioning systems commonly used today.

Whereas the system is normally used to provide a device with its location, here it's used to track the device's location. This requires having a network of Wi-Fi access points sharing data.

https://en.wikipedia.org/wiki/Wi-Fi_positioning_system


Its awesome that Pi's are finding their way into stuff like this but its still a tiny bit of round hole, square peg.

You could do it for 1/2 the price with a TP-Link TL-WR703N and OpenWRT. Lots of these types of projects are already install-and-go ready for OpenWRT.


Indeed, like the somewhat well-known "WiFi Pineapple":

http://hackaday.com/2013/04/29/wifi-pineapple-project-uses-u...


Having done some hacking with those little TP-Link devices (well, on a TL-MR3020, which is almost identical), I will say that Debian on a Raspberry Pi is much easier to work with than OpenWRT on a TL-.

With the TL- devices, you have very limited writeable storage, and as it's an append-only file system, the only way to reclaim the space is to reflash the system. A Pi, by comparison, feels like a normal computer system.

Twice the price isn't necessarily a bad deal, unless you're working in such volume that development time is an insignificant part of the overall project cost. Given the choice, I'd go for a Raspberry Pi next time.


Screw unsecured wifi - most peoples wifi is encrypted, these days (at least around here).

I wonder how secure 3g connections are? Because it would seem to one could get a lot more information out of those.

Edit: speling


While I didn't attend this talk, someone mentioned that there was a talk at Defcon where 3g networks were being sniffed.

https://www.defcon.org/html/defcon-21/dc-21-speakers.html Do-It-Yourself Cellular IDS "For less than $500, you can build your own cellular intrusion detection system to detect malicious activity through your own local femtocell. Our team will show how we leveraged root access on a femtocell, reverse engineered the activation process, and turned it into a proof-of-concept cellular network intrusion monitoring system.

We leveraged commercial Home Node-Bs (""femtocells"") to create a 3G cellular network sniffer without needing to reimplement the UMTS or CDMA2000 protocol stacks. Inside a Faraday cage, we connected smartphones to modified femtocells running Linux distributions and redirected traffic to a Snort instance. Then we captured traffic from infected phones and showed how Snort was able to detect and alert upon malicious traffic. We also wrote our own CDMA protocol dissector in order to better analyze CDMA traffic."


I think the author of this article doesn't really understand the technology behind packet sniffing, open wifi, what packets iPhones are sending, etc.

The article makes it sound like somehow this "device" (really just a computer - a Raspberry Pi) is somehow some special technology that people should watch out for. When I can do all of these things on any laptop on an open network. And in fact, that's going to be less attention grabbing in a cafe than some mysterious black box under a table.

It's a shame that the take away message wasn't that any open network is a security risk, not just when someone happens to have one of these "gadgets", but anyone on the network with a laptop can do the same thing.


The point is not "your phone/tablet network traffic can be overheard", the point is "it can be overheard and uniquely identified, therefore anyone putting cheap access points around your area can track which ones you go near, and when".


Unencrypted data sent through public wi-fi can be snooped on, that's as new as sliced bread.


Don't despair, something great could come out of this article. A representative could read it, freak out and propose a bill that would ban raspberry-pi and regulate the hell out of the booming open hardware industry.


you think the competitors of the Pi in the US are not doing this all ready.

There is a lot of NIH in the comments about the pi on HN and ./



How would these boxes pick up 3g/4g traffic? Also, to pick up WiFi wouldn't the communications have to be unencrypted?


He said "public wifi". That gave me a bit of a jolt too at first.

I wonder if there are any known instances of someone monitoring and collecting a high value target's encrypted home wifi (say a CEO before earnings, or someone at the department of labor) with the goal of cracking it.


Definitely not even necessary to buy all that equipment. My friend and I do this with Wireshark on his laptop all the time.


Yeah, wireshark can definitely sniff the network, but he was trying to point out that for $57 you can make ten of these and plug it in to empty outlets around the city, hotels, cafes, etc. and it would record data and send it back to a server....

Now imagine the government placed these nodes everywhere... they would basically have a fixed GPS on you.


Why do sites like this go out of their way to disable pinchzoom? Why remove useful functionality?


When they mention a wifi unique identifier do they mean a MAC address?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: