[Rushtalk] The New Overhead Privacy Thief

Paf Dvorak notmyname at thatswaytoomuch.info
Sat May 3 19:52:52 MDT 2014


At 09:05 PM 5/3/2014 -0400, John A. Quayle wrote:
>         The BEST way to protect yourself from this violation of 
> your constitutional rights is to shoot one down.......

No, the best way is to not be suckered into thinking you need a smartphone.



>-jaq
>
>
>
>
>At 09:37 PM 4/30/2014, you wrote:
>
>
>>
>>
>><http://i-hls.com/2014/03/new-overhead-privacy-thief/>The New 
>>Overhead Privacy Thief
>>
>>
>>
>>
>>
>>http://i-hls.com/2014/03/new-overhead-privacy-thief/?utm_source=Israel+Homeland+Security+%28iHLS%29&utm_campaign=885deb8545-Newsletter_English_IL_26_3_2014&utm_medium=email&utm_term=0_8ee2e16ed1-885deb8545-87451153 
>>
>>
>>Posted by <http://i-hls.com/author/newsdesk/>newsdesk
>>Illustration photo (123rf)
>>
>>
>>Illustration photo (123rf)
>>
>>The next threat to your privacy could be hovering overhead while 
>>you walk down the street. Hackers have developed a 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>>that can steal the contents of your smartphone and access your 
>>password. The technology equipped on the 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone, 
>>known as Snoopy, looks for mobile devices with Wi-Fi settings turned on.
>>
>>Snoopy takes advantage of a feature built into all smartphones and 
>>tablets: When mobile devices try to connect to the Internet, they 
>>look for networks theyve accessed in the past.
>>
>>Thats when Snoopy can swoop into action: the 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>>can send back a signal pretending to be networks youve connected to 
>>in the past. Devices two feet apart could both make connections 
>>with the quadcopter, each thinking it is a different, trusted Wi-Fi 
>>network. When the phones connect to the 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone, 
>>Snoopy will intercept everything they send and receive.
>>
>>According to 
>>s<http://i-hls.com/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/> 
>>UAS that includes the sites you visit, credit card information 
>>entered or saved on different sites, location data, usernames and 
>>passwords. Each phone has a unique identification number, or MAC 
>>address, which the 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>>uses to tie the traffic to the device.
>>
>>The names of the networks the phones visit can also be telling. CNN 
>>Money recently took Snoopy out for a spin and were able to show 
>>what they believed to be the homes of several people who had walked 
>>underneath the 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone. 
>>In less than an hour of flying, he obtained network names and GPS 
>>coordinates for about 150 mobile devices.
>>
>>They were also able to obtain usernames and passwords for Amazon, 
>>PayPal and Yahoo accounts created for the purposes of the reporting 
>>so that they could verify the claims without actually stealing from people.
>>
>>Collecting metadata, or the device IDs and network names, is 
>>probably not illegal, according to the Electronic Frontier 
>>Foundation. Intercepting usernames, passwords and credit card 
>>information with the intent of using them would likely violate 
>>wiretapping and identity theft laws.
>>
>>Installing the technology on drones creates a powerful threat 
>>because drones are mobile and often out of sight for pedestrians, 
>>enabling them to follow people undetected.
>>
>>While most of the applications of this hack are creepy, it could 
>>also be used for law enforcement and public safety. During a riot, 
>>a 
>><http://i-hls.com/he/2014/01/ausr-2014-expo-autonomous-unmanned-systems-robotics/>drone 
>>could fly overhead and identify looters, for example.
>>
>>Users can protect themselves by shutting off Wi-Fi connections and 
>>forcing their devices to ask before they join networks.
>>
>>
>>
>>
>>_______________________________________________
>>Rushtalk mailing list
>>Rushtalk at csdco.com
>>http://kalos.csdco.com/mailman/listinfo/rushtalk
>_______________________________________________
>Rushtalk mailing list
>Rushtalk at csdco.com
>http://kalos.csdco.com/mailman/listinfo/rushtalk



Paf Dvorak  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://kalos.csdco.com/pipermail/rushtalk/attachments/20140503/40cc42d7/attachment.html 


More information about the Rushtalk mailing list