Friday, November 14, 2014

Digital Tracking

This link pdf , published in 2012,  is a easy reading informative description of digital tracking capabilities related to many different communication protocols related to a SensePoint product. 
The tracking software tool is "Snoopy".  It runs on an Linux device and is capable of operating on off the shelf hardware.  It presents several actual uses of the tool to collect data and the analysis of the data it gathers.  Various modes of collection operation are also presented:  Sentry, Mobile, Arial, Ground Vehicle and Telescope.  It also presents aerial positioning techniques using drones.
An interesting test of its performance was made in the analysis of attendees at 12 communication conferences.  The largest was Black Hat Vegas in 2012.  4,778 unique devices were detected among 6,500 attendees.  This was cross referenced to other conferences as well as repeat visitors to the same conference in a following year. 
I started out this morning to do research on near field low power IMSI detection  in order to discover what exists in the way of indoor or close proximity detection and location of cell phone IMSI identification.  A useful method to target waiting lines of people carrying cell phones for pre-screening prior to an inspection point or individual cell phones as they pass through entrance points.  This pdf diverted me with a worthwhile summary of digital tracking capabilities.
This link written by Pierluigi Paganini is a 2014 update on Snoopy that says:  "Researchers at Sensepoint have realized a software that could be used to turn a drone in a perfect spying machine able to steal data from mobile devices."  They must be sleepy researchers to have just waken up to this fact!

Pierluigi Paganini  also wrote this about Stingray technology.  It is also easy reading on a very technical subject written by a communications expert who concerned about how this technology is applied.  I applaud him and his efforts to inform the public.  It is the best summary of the technology it application and the issues raised that I have found to date.

 Pierluigi Paganini describes the following equipment: Stingray, Triggerfish, Kingfish, Amberjack, Harpoon, Hailstorm and Gossamer.  Pierluigi is a certified ethical hacker.  This is a google search with links to what he has written in the last month.  Good stuff.  Good guy.  This Security News Concentrator covers what he has written.


No comments: