Raspberry Pi for Secret Agents

Total Page:16

File Type:pdf, Size:1020Kb

Raspberry Pi for Secret Agents Raspberry Pi for Secret Agents Third Edition Turn your Raspberry Pi into a secret agent toolbox with this set of exciting projects Matthew Poole BIRMINGHAM - MUMBAI Raspberry Pi for Secret Agents Third Edition Copyright © 2016 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author(s), nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: April 2013 Second edition: January 2015 Third edition: July 2016 Production reference: 1210716 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78646-354-8 www.packtpub.com Cover image by Connecting Objects (connectingobjects.com) Credits Author Copy Editor Matthew Poole Safis Editing Reviewer Project Coordinator Jon Witts Kinjal Bari Commissioning Editor Proofreader Kartikey Pandey Safis Editing Acquisition Editor Indexer Tushar Gupta Tejal Daruwale Soni Content Development Editor Production Coordinator Trusha Shriyan Arvindkumar Gupta Technical Editor Rupali R. Shrawane About the Author Matthew Poole is a systems engineer based near Southampton on the south coast of England, with over 20 years of industry experience. After graduating in electronics and communications engineering, he went on to train as and become an air traffic engineer for Civil Aviation Authority, UK, working on microprocessor-based control and communications systems. Later, he became a software architect and mobile technology specialist, working for several consultancies and global organizations in both hands-on architecture and product- management roles . He is now a partner at Connecting Objects, a boutique systems consultancy focusing on the design of Bluetooth and other wireless-based IoT systems, taking ideas from concept to prototype. He is also the Director of Technology for Mobile Onboard, a leading UK-based transport technology company specializing in bus connectivity and mobile ticketing systems. He is also the author of Building a Home Security System with Raspberry Pi, Packt Publishing. You can find his blog at h t t p : / / c u b i k s o u n d z . c o m and LinkedIn profile at h t t p s : / / w w w . l i n k e d i n . c o m / i n / c u b i k, or you can reach him on Twitter at @cubiksoundz. About the Reviewer Jon Witts has been working within the IT industry since 2002 and specifically within educational IT since 2004. He was introduced to Linux back in 2001 through his collaboration with two German artists who were visiting the arts organization he was then working with. Having studied Fine Arts and Educational Technology, and having sought to innovate with open and accessible digital technologies within his creative practice, Jon is happiest when deconstructing technology and finding its limits. Jon has embedded within his school the use of Raspberry Pi computers, as an integral part of the delivery of the school’s Computer Science curriculum, as well as to run various school clubs and projects. Jon is a Raspberry Pi Certified Educator and also helps to organize and run the Hull Raspberry Jam events. I would like to thank my wife, Sally, and our three daughters for putting up with all the cables and components around the house, not least for being so tolerant of the need to dodge the robots racing round the kitchen floor! www.PacktPub.com For support files and downloads related to your book, please visit www.PacktPub.com. Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details. At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks. h t t p s : / / w w w 2 . p a c k t p u b . c o m / b o o k s / s u b s c r i p t i o n / p a c k t l i b Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can search, access, and read Packt's entire library of books. Why subscribe? Fully searchable across every book published by Packt Copy and paste, print, and bookmark content On demand and accessible via a web browser Free access for Packt account holders If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view 9 entirely free books. Simply use your login credentials for immediate access. Table of Contents Preface 1 Chapter 1: Getting up to No Good 7 A brief history lesson on the Pi 7 Raspberry Pi Model A 9 Raspberry Pi Model B 10 Raspberry Pi Model B+ 11 Raspberry Pi Model 2 12 Raspberry Pi Zero 13 Raspberry Pi 3 15 So, which Pi for us spies? 16 Where to buy a Pi 17 The ins and outs of the Raspberry Pi 17 GPIO headers 18 Audio/Video jack 19 Status LEDs 19 USB 19 Ethernet port 19 CSI camera connector 19 Display Serial Interface 20 HDMI 20 Power 20 MicroSD card 21 Preparing the SD card 21 Download the Raspbian image 21 Using Microsoft Windows 22 Using Linux 23 Boot up your Pi 24 Expand the filesystem 25 Goodbye GUI 25 Using the raspi-config utility 26 Setting up your Pi 27 The importance of a sneaky headless setup 30 Keeping your system up to date 31 Backing up your SD card 31 Complete SD card backup in Windows 32 Complete SD card backup in MAC OS X 33 Complete SD card backup in Linux 34 Summary 36 Chapter 2: Audio Antics 37 Configuring your audio gadgets 37 Sound variations 37 Introducing the ALSA sound system 38 Controlling the volume 39 Switching between HDMI and analog audio output 41 Testing the speakers 43 Preparing to record 43 Testing the microphone 48 Clipping, feedback distortion, and improving sound quality 49 Recording conversations for later retrieval 50 Writing to a WAV file 51 Writing to an MP3 or OGG file 51 Creating command shortcuts with aliases 53 Keep your recordings running safely with tmux 54 Making a covert wearable recorder with Pi Zero 56 Listening in on conversations from a distance 61 Listening in Windows 61 Listening in Mac OS X or Linux 63 Listening in over Bluetooth 65 Introducing Bluetooth audio 65 Setting up Bluetooth on the Pi 65 Installing PulseAudio 68 Connect to your Bluetooth headset or speaker 68 Bluetooth by default 71 Talking to people from a distance 73 Talking in Windows 73 Talking in Mac OS X or Linux 74 Attention Mac users 75 Talking in Bluetooth 75 Distorting your voice in weird and wonderful ways 76 Make your computer do the talking 78 Scheduling your audio actions 79 Start on power up 79 Scheduled start 82 [ ii ] Controlling recording length 83 Start recording with noise detection 84 Calling your fellow agents 86 Setting up SIP Witch 86 Connecting the softphones 90 Windows (MicroSIP) 91 Configuring the MicroSIP softphone for Windows 92 Mac OS X (Telephone) 92 Linux (Ring) 93 Android (CSipSimple) 93 iPhone/iPad (Linphone) 94 Running a softphone on the Pi 94 Encrypting SIP Witch passwords 95 Setting up Linphone 95 Playing files with Linphone 97 Using your voice to control things 98 Give your Pi some ears 99 Bonus one-line sampler 103 Summary 104 Chapter 3: Webcam and Video Wizardry 105 Meet the USB Video Class drivers and Video4Linux 105 Raspberry Pi Camera Module 106 Connecting the camera module 107 Setting up the camera module 109 Using USB cameras 113 Connecting the webcam 113 Finding out your webcam's capabilities 116 Capturing your target on film 117 Viewing your camera in VLC media player 121 Viewing in Windows 121 Viewing in Mac OS X 122 Viewing in Linux 123 Recording the video stream 123 Recording in Windows 124 Recording in Mac OS X 124 Recording in Linux 125 Detecting an intruder and setting off an alarm 125 Creating a motion detection configuration 126 Trying out Motion 128 Collecting the evidence 130 [ iii ] Viewing and e-mailing the evidence 132 Hooking up more cameras 133 Preparing a webcam stream in Windows 133 Preparing a webcam stream in Mac OS X 133 Configuring MotionEye for multiple input streams 134 Watching your camera over the Internet 136 The link between the Pi and the broadcasting service 136 Night vision 139 Make a covert wearable recorder with Pi Zero 140 Turning your TV on or off using the Pi 141 Scheduling a playback scare 142 Summary 144 Chapter 4: Wi-Fi Pranks – Exploring Your Network 146 Getting an overview of all the computers on your network 147 Monitoring Wi-Fi airspace with Kismet 147 Preparing Kismet for launch 149 First Kismet session 151 Adding sound and speech 154 Enabling rogue access point detection 155 Mapping out your network with Nmap 156 Finding out what the other computers are up to 159 How encryption changes the game 163 Traffic logging 164 Shoulder surfing in Elinks 164 Pushing unexpected
Recommended publications
  • Learning to Program in Perl
    Learning to Program in Perl by Graham J Ellis Languages of the Web Learning to Program in Perl version 1.7 Written by Graham Ellis [email protected] Design by Lisa Ellis Well House Consultants, Ltd. 404, The Spa, Melksham, Wiltshire SN12 6QL England +44 (0) 1225 708 225 (phone) +44 (0) 1225 707 126 (fax) Find us on the World Wide Web at: http://www.wellho.net Or contact us at: [email protected] Copyright © 2003 by Well House Consultants, Ltd. Printed in Great Britain. Printing History May 1999 1.0 First Edition February 2000 1.1 Minor additions June 2000 1.2 Compliation of modules October 2000 1.3 Name change, revisions April 2002 1.4 Added modules September 2002 1.5 Added modules January 2003 1.6 Updated modules February 2003 1.7 Updated modules This manual was printed on 21 May 2003. Notice of Rights All rights reserved. No part of this manual, including interior design, may be reproduced or translated into any language in any form, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise, without prior written permission of Well House Consultants except in the case of brief quotations embodied in critical articles and reviews. For more information on getting permission for reprints and excerpts, contact Graham Ellis at Well House Consultants. This manual is subject to the condition that it shall not, by way of trade or otherwise, be lent, sold, hired out or otherwise circulated without the publisher's prior consent, incomplete nor in any form of binding or cover other than in which it is published and without a similar condition including this condition being imposed on the subsequent receiver.
    [Show full text]
  • Hacker Public Radio
    hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series.
    [Show full text]
  • Logistics Environment Awareness System Prototype Based on Modular Internet of Things Platform
    170 Scientific Journal of Maritime Research 29 (2015) 170-179 © Faculty of Maritime Studies Rijeka, 2015 Multidisciplinary Multidisciplinarni SCIENTIFIC JOURNAL OF znanstveni časopis MARITIME RESEARCH POMORSTVO Logistics environment1 awareness3 system prototype based on 2 modular1 Internet of Things platform Saša Aksentijević , David Krnjak , Edvard Tijan 23 Aksentijevic Forensics and Consulting Ltd, Gornji Sroki 125a, Viškovo, Croatia Saipem SpA Croatian Branch, Alda Collonnella 2, Rijeka, Croatia University of Rijeka, Faculty of Maritime Studies Rijeka, Studentska 2, 51000 Rijeka, Croatia, e-mail: [email protected] ABSTRACT ARTICLE INFO Internet of Things (IoT) is a completely new paradigm of interconnected computing devices in the Preliminary communication market segment that has started emerging from 2013, while trends have been recognized in 2014 and Received 22 November 2015 most predictions are related to the period until 2020. Anticipating widespread use of IoT technology KeyAccepted words: 18 December 2015 in logistics chains reported by leading sector players, a dedicated logistics testbed IoT platform named MiOT is created and tested using Raspberry PI minicomputer, with research goal to evaluate possibilities of integration of the logistics IoT platform inside existing Windows corporate domains. Internet of Things Logistics Environment awareness system 1 Introduction IoT paradigm emerged due to convergence of various technologies approximately as of 2013, even though it has Internet of Things (IoT) is a new and upcoming para- been in some its aspects discussed for decades and has digm related to networking of various applicative physical been a topic of science fiction even longer than that. devices (“things”), as opposed to current situation where At the end of 2014 there were 3,75 billion such devices networking refers primarily to computer and network already in use, and predictions state that at the end of 2015 devices and peripherals.
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • A Java Virtual Machine Extended to Run Parrot Bytecode
    A JAVA VIRTUAL MACHINE EXTENDED TO RUN PARROT BYTECODE A thesis submitted to the University of Manchester for the degree of Master of Science in the Faculty of Engineering and Physical Sciences 2006 By Martin Dahl School of Computer Science Contents Abstract 8 Declaration 9 Copyright 10 Acknowledgements 11 1 Introduction 12 1.1 Objectives and Motivation . 13 1.2 Related Work . 13 1.2.1 Parrot . 14 1.2.2 Pugs . 14 1.2.3 PearColator . 14 1.3 Organisation of the Thesis . 15 2 The Parrot Project 16 2.1 Perl 6 . 17 2.1.1 Design . 17 2.1.2 Perl 6 Internals . 18 2.1.3 Pugs . 19 2.1.4 Parrot Perl 6 Compiler . 19 2.2 Virtual Machine . 20 2.2.1 Design . 20 2.2.2 Architecture . 21 2.2.3 Registers . 22 2.2.4 Instruction Set . 23 2.2.5 Parrot Assembly Language and Intermediate Representation 24 2 2.3 Parrot Magic Cookies . 24 2.3.1 Core PMCs . 24 2.3.2 Other PMCs . 27 2.4 Compiler suite . 27 2.4.1 Perl 6 . 27 2.4.2 Other languages . 27 2.5 Summary . 28 3 Parrot Bytecode Format 30 3.1 Header . 31 3.2 Bytecode Format 1 . 33 3.2.1 Directory Segment . 34 3.2.2 Constant Table Segment . 35 3.2.3 Bytecode Segment . 38 3.2.4 Debug Segment . 38 3.2.5 Fixup Segment . 39 3.3 Summary . 40 4 Parakeet 41 4.1 Overview . 42 4.2 Jikes RVM . 43 4.3 PearColator .
    [Show full text]
  • VLC User Guide
    VLC user guide Henri Fallon Alexis de Lattre Johan Bilien Anil Daoud Mathieu Gautier Clément Stenac VLC user guide by Henri Fallon, Alexis de Lattre, Johan Bilien, Anil Daoud, Mathieu Gautier, and Clément Stenac Copyright © 2002-2004 the VideoLAN project This document is the complete user guide of VLC. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. The text of the license can be found in the appendix. GNU General Public License. Table of Contents 1. Introduction.........................................................................................................................................................................1 What is the VideoLAN project ?.....................................................................................................................................1 What is a codec ?............................................................................................................................................................3 How can I use VideoLAN ?............................................................................................................................................3 Command line usage.......................................................................................................................................................4 2. Modules and options for VLC...........................................................................................................................................8
    [Show full text]
  • Omegakey Manage Your Device at the Management Module
    Welcome to use our latest version of Lost Mode How to Start to Use it Bluetooth tracker. Detect the distance between the device and Bluetooth Tracker module your phone under the lost mode .Turn on the Step 1: Download the latest version App(version 1.6.0) from Apple App store. omegakey Manage your device at the management module. alarm at alert whether the device is lost, there Step 2: Open the Bluetooth and App. are two levels of lost alarm mode. Select the Thank you for purchasing omegakey Freely set and remove your device here. Step 3: Tap the Beacon for 3-5 times on hard surface, and the Beacon will be connectable when you Double-click the “call” button to find your device. alarm mode you want from the device. Phone hear a buzz. alarm, and both ends alarm. Step 4: Click the Beacon in the App which you want to configure and enter a name to connect it. Step 5: Now, you can configure and use the Beacon normally. NEXT Note: If you're having trouble with the Bluetooth, we recommend you completely remove the battery from the unit for 10 sec and reinsert it. There are many apps you can download some are better than others, we have linked just click on the apple / android icons on the first page Once you have selected the app you like download it and follow the on screen instructions ATTACH BLUETOOTH BEACON EXTERNALLY FOR MAX PERFORMANCE Found mode More View the alarm location or item's last location Find the device under the find mode according p.s make sure your Bluetooth is on and your phone is compatible with 4.0 Bluetooth to the strength of the signal.
    [Show full text]
  • A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes
    A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes Extremely fast forensic imaging speed surpassing 50GB/min. Clone PCIe to PCIe at speeds above 90GB/min Image to/from Thunderbolt™ 3/USB-C external storage enclosures with an optional I/O card. Image and verify from up to 5 source drives up to 9 destinations simultaneously Create a logical image to capture only specific files needed Concurrent Image+Verify greatly reduces duration of image plus verification process Two 10GbE connections provide fast network imaging performance Network capture feature to capture network traffic, VOIP, internet activity Multi-task. Image from multiple sources simultaneously FEATURES n The Falcon®-NEO achieves imaging speeds when imaging directly to large capacity Thunder- n Image from a Mac® computer with USB-C ports surpassing 50GB/min and can clone PCIe to PCIe bolt 3 RAID storage enclosures for evidence data using a USB-C to USB-A cable and Target Disk at speeds at over 90GB/min. collection. The card connects to the Falcon-NEO’s Mode or use Logicube’s USB boot device to n Image and verify to multiple image formats; 2 write-blocked source I/O ports or 1 destination I/O image a source drive from a Mac computer on the native copy, .dd, dmg, e01 and ex01. The Falcon- port. The I/O card does not currently support imaging same network without booting the Mac computer’s ® NEO provides MD5, SHA1, SHA256, and dual hash in TDM from Mac systems, refer to the Falcon-NEO native OS. The Falcon-NEO supports imaging from ® authentication at extremely fast speeds.
    [Show full text]
  • TECH TOOLS for ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE of CONT ENT S
    TECH TOOLS FOR ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE OF CONT ENT S Tech Tools For Activism 1 An introduction to this booklet 2 2 Securing your email 4 3 Anonymous Blogs and Websites 7 4 Microblogging Beyond Twitter 9 5 Browsing the Internet 11 6 Organising and Networking Online 14 7 Mobile Phone Security and Android Apps 18 8 Publishing and Networking News 21 9 Producing and Publishing Media to the Internet 23 10 Green Computing 25 11 Hiding & Deleting Things on your PC 27 TECH TOOLS FOR ACTIVISM 1. AN INTRODUCTION TO THIS BOOKLET 2. SECURING YOUR EMAIL 3. ANONYMOUS BLOGS AND WEBSITES 4. MICROBLOGGING BEYOND TWITTER 5. BROWSING THE INTERNET 6. ORGANISING AND NETWORKING ONLINE 7. MOBILE PHONE SECURITY AND ANDROID APPS 8. PUBLISHING AND NETWORKING NEWS 9. PRODUCING AND PUBLISHING MEDIA TO THE INTERNET 10. GREEN COMPUTING 11. HIDING & DELETING THINGS ON YOUR PC 1 1. AN INT RODUCT ION T O T HIS BOOKLET T his booklet will help you to: use email securely publish news and upload media anonymously make your web browsing more anonymous and secure use Facebook and Twitter more securely get organised online without relying on corporate social networking sites use encrypted messaging on mobile phones hide stuff on your computer so it can't be found find a more secure and decentralised replacement for Twitter support free software, open licences and decentralised/ federated communication. Why this booklet is important: This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information.
    [Show full text]
  • Mobiflage: Deniable Storage Encryption for Mobile Devices 3
    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Mobiflage: Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Abstract—Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. Index Terms—File system security, Mobile platform security, Storage Encryption, Deniable encryption ✦ 1 INTRODUCTION AND MOTIVATION plaintext can be recovered by decrypting with the true key. In the event that a ciphertext is intercepted, and the Smartphones and other mobile computing devices are user is coerced into revealing the key, she may instead being widely adopted globally.
    [Show full text]
  • WEAVING GREAT TECHNOLOGY INTO OPERATIONS on a TIGHT BUDGET OUTLINE Tuesday, August 24, 2010, 9:00 AM - 10:15 AM
    WEAVING GREAT TECHNOLOGY INTO OPERATIONS ON A TIGHT BUDGET OUTLINE Tuesday, August 24, 2010, 9:00 AM - 10:15 AM Jim Cooke & Renato Sogueco It's All About Choices Microsoft is not evil! Just another choice. Remove emotion: For or Against Microsoft Make Pragmatic Assessments of Software Needs Open Source is a Solid Choice Yes, it's mostly FREE Support is solid And then there is the Cloud! Bottom line? Change Your Perspective Willing to play with new choices. Stop Performing Break/Fix Start introducing Savings, New Ideas, Better Tools Solutions for... • Desktops • Hardware Resource Management • Server Software o Virtualization o Webserver • Broadband • Cloud • Web Tools • Other Desktop Solutions Linux Desktop Replaces Windows/Macintosh Free, easy to install Runs fast, even on old hardware (more on this later) No viruses, malware Lots of free applications Ubuntu: http://www.ubuntu.com/getubuntu/download Windows Terminal Server & Knoppix: http://www.knoppix.net Windows Workstations to Windows Terminal Server w/ Dumb Terminals 1 less tech person ($40,000 savings) Manage 2 Terminal Servers Stop managing 30 workstations Built-in remote access (travel, vacation, sick, inclement weather) Knoppix vs Windows Cyberguys: Used IBM 366 Mhz 1MB RAM Base CD ROM player... http://www.knoppix.net/ Dell Optiplex 380MT: Intel Core Duo 2GB DDR3 160GB SATA 16x DVD RW Integrated Video Intel GMA 4500 Used IBM New Dell Cost / Machine $80 $600 # of Machines 30 30 Total Cost $2,400 $18,000 Recycling can save you tens of thousands of dollars. Windows EeePC (Netbooks) as Workstation and Laptop • $80 Knoppix workstations not good enough? • Need sound and video? • Users require more flexibility? Try $300 Netbooks & Eliminate your Laptop pool Make machines uniform/generic (not user specific) Let users know you will swap out their machines Use System Restore (Go to Control Panel; Performance and Maintenance) Cheap Flexible - light, wifi - connect to regular keyboard, mouse & monitor.
    [Show full text]