Party Vibe

Register

Welcome To

The NSA Playset: Espionage tools for the rest of us

Forums Life Computers, Gadgets & Technology Computer Viruses, Trojans & Threats. The NSA Playset: Espionage tools for the rest of us

  • This topic is empty.
Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • some interesting stuff there; particularly the use of the cheap RTL-SDR for GSM monitoring.

    As far as I am aware it is perfectly legal in EU/CEPT countries to monitor your own wireless communications [or others you have permission for such as at your employer] using these devices.

    A heads up that some of the projects that involve building mini GSM base stations can get you in bother if done in the wrong place (as they could disrupt the main networks including 112/999 calls) but it is actually possible to get a small scale experimental license for these units from most European Communications Ministries (i.e Ofcom, Agentschap Telecom, BNetzA etc). This is fairly new; something to do with CEPT/ERO in Denmark encouraging people to learn about wireless communications.

    I had wondered how a hackerspace in NL had managed to set up its own GSM network (that links to the internal phone system) without getting bother from Agentschap..

    You do have to fill in some paperwork, declare that you are not using it for intercepting/forwarding any traffic from the national networks and tell them exactly where you are operating the device (there is usually a small admin fee but often less than €100 for up to 5 years). It is not a requirement to have an amateur radio license but the profs at the Communications Ministry are more likely to be supportive if you do, or at least can prove you know one end of an antenna from the other and how to avoid causing harmful interference. The equipment must be either a certain distance away from any public GSM base station (or safely within a Faraday cage so no stray signals escape) and limited in transmitter power output; although anything affordable is only going to be a few milliwatts power output (TBH you don’t want to be standing too near to anything stronger as the radiation isn’t good for you…)

    I remember watching a talk from either the Black Hat conference or DEFCON where a man set up a base station (very low power, just covering the room basically but he had the gear to do MUCH more) where he was able to intercept pretty much every phone used in the room. Was awesomely interesting and I wish I could remember more specifics on it cos I’d love to share it with you GL.

    Well, didn’t take long to find.

    https://www.youtube.com/watch?v=xKihq1fClQg

    Interesting to learn that Rohde & Schwarz invented the “Stingray” technique and Americans appear to have just borrowed it without much credit!

    I’ve got a copy of a WW II training film for the LN-Dienst (Luftwaffe Intelligence) I downloaded from some US archive a while back where they refer to “Das RS-Gerät” and in the 2015 BNetzA documentary they are using Rhode & Schwarz equipment to search out the Pfeifton being transmitted to the aircraft comms (which was caused by an animal scarer installed in the roofspace by some middle aged dude)

    Ofcom use it as well but the last chap there I saw doing field ops a few years back said that our Govt would only buy the cheapest one with a black and white display and they had to share about 3 of them between the whole of London and the East [he actually told me I’d be better off fox hunting the stray signals myself as long as I didn’t jam them out or threaten to beat up anyone – and encouraged me to buy a new scanner radio to replace one that had developed various faults due to years of being carted around to raves to listen in on Old Bill (which he blatantly knew I would have been doing in the 90s)

    Remember that mobile phone data extraction tool we mentioned a few days ago GL? Was it called a cellebrighte (cellebirte?????) by any chance?

    that is indeed one of the devices but in the Suffolk Police press release the device was unidentified and they mentioned some involvement with British Telecom – I expect it is linked to this press release which is undated but from roughly around the same era,

    The forensic view of bits and bytes

    Reading through that, where he mentions the importance of erasing sensitive data, reminds me of around 3-4 months ago I went into a shop that sold used hardware and bought a 2.5″ SSD )128GB but cost like 12 quid). When I got it home I whacked it into an external enclosure and found, THE FULL WINDOWS PARTITION PLUS ALL THAT MANS DATA still on the drive. I emailed the store (CEX if you care) and told em. I got some prickish reply back so they got an even more prickish one from me. As I had this mans entire fucking details, I told em I’d just send the disk to the Northern Echo (regional newspaper) and let them find the owner.

    Shortly after I had an email saying I was awesome and that a trainee had failed to erase the disk and was given £5 store credit (I emailed back and said I hoped the trainee was in no trouble as it was clearly the trainer at fault) and told that all disks had been checked now. Well to test that horseshit I went in and bought a 750GB 2.5″ HDD and whacked that fucker in my enclosure to find, SHOCK, FUCKING, HORROR, an entire data partition left on the disk. Emailed them and they were fucking sick but seeme dto go on like I was the prick and not them (they told me they sacked the trainee though).

0

Voices

6

Replies

Tags

This topic has no tags

Viewing 8 posts - 1 through 8 (of 8 total)
  • You must be logged in to reply to this topic.

Forums Life Computers, Gadgets & Technology Computer Viruses, Trojans & Threats. The NSA Playset: Espionage tools for the rest of us