Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Machines That Betrayed Their Masters

Black Hat via YouTube

Overview

Explore the world of privacy invasion through wireless signals in this Black Hat Asia 2014 conference talk. Delve into Glenn Wilkinson's journey of developing a robust, modular, and distributed tracking framework called Snoopy. Learn about the vulnerabilities of devices that emit uniquely identifiable signals, particularly mobile phones. Discover how these signals can be exploited for tracking and potentially malicious purposes. Examine the evolution of the Snoopy framework from its inception in 2012 to its advanced capabilities, including integration with quadcopter technology. Gain insights into various tracking techniques, geolocation methods, and device interactions. Witness live demonstrations showcasing the framework's abilities, including drone-based surveillance and data collection. Explore topics such as trilateration, entity tracking, time metrics, and the ethical implications of such technologies. Understand the potential threats to personal privacy and learn about countermeasures like the Drone Survival Guide.

Syllabus

Introduction
About Glenn
Surveillance
Machines
Devices
WiFi
geolocation
interacting with device
Snoopy framework
Next generation Snoopy
Snoopy Drone Demo
Nokia N900
Flying in London
Hotel
Trilateration
MultiGo
Snoopy Entities
Time Metrics
Transform Fetch
Live Demo
Logitech Morpheus
Grab
Riggle
Street View
Isis IDs
Snoopy Software
Lucky
EXIF
Linksys
Rogue Access Point
Apple Device
Multi Go
Morty
Post Employees
Devices observed
Verint
Drone Survival Guide
Quick Graph
Questions

Taught by

Black Hat

Reviews

Start your review of The Machines That Betrayed Their Masters

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.