Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of privacy invasion through wireless signals in this Black Hat Asia 2014 conference talk. Delve into Glenn Wilkinson's journey of developing a robust, modular, and distributed tracking framework called Snoopy. Learn about the vulnerabilities of devices that emit uniquely identifiable signals, particularly mobile phones. Discover how these signals can be exploited for tracking and potentially malicious purposes. Examine the evolution of the Snoopy framework from its inception in 2012 to its advanced capabilities, including integration with quadcopter technology. Gain insights into various tracking techniques, geolocation methods, and device interactions. Witness live demonstrations showcasing the framework's abilities, including drone-based surveillance and data collection. Explore topics such as trilateration, entity tracking, time metrics, and the ethical implications of such technologies. Understand the potential threats to personal privacy and learn about countermeasures like the Drone Survival Guide.
Syllabus
Introduction
About Glenn
Surveillance
Machines
Devices
WiFi
geolocation
interacting with device
Snoopy framework
Next generation Snoopy
Snoopy Drone Demo
Nokia N900
Flying in London
Hotel
Trilateration
MultiGo
Snoopy Entities
Time Metrics
Transform Fetch
Live Demo
Logitech Morpheus
Grab
Riggle
Street View
Isis IDs
Snoopy Software
Lucky
EXIF
Linksys
Rogue Access Point
Apple Device
Multi Go
Morty
Post Employees
Devices observed
Verint
Drone Survival Guide
Quick Graph
Questions
Taught by
Black Hat