Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Spy-tech brainstorm.

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Science Donate to DU
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-03-05 06:19 PM
Original message
Spy-tech brainstorm.
I've been harboring a building meme for some time that one of the only weapons we Dems have in politics is the criminal justice system (and the only reason it is a weapon is because our opponents are so awfully corrupt.) Of course, to use it, we have to have evidence, which requires being in the right place, at the right time, with the right equipment.

It's about time we had a brainstorm session to come up with some activist kits that are cheap, relatively disposable and user-freindly (so they can be handed out without too much loss), and useful for catching the opposition up to their tricks.

These kits could be something as simple and grass-roots as a way to rig up a disposable camera to catch yard-sign theives during an election, or as complex as wearable discrete recording (with accompanying legal advice materials that advise as to what the liabilities are on using it in certain cirumstances.)

The discussion on what to do with incriminating evidence once you get it is something best left for another time/forum.

Also data protection for political offices is a subject in and of itself -- an important one, but let's talk hardware for now.

Googling "spy tech" gets a good start to companies selling gadgets, but most such places are likely to price-gouge. Anyone got any ideas?

Printer Friendly | Permalink |  | Top
Emperor_Norton_II Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-03-05 07:10 PM
Response to Original message
1. Cameraphones. Has to be cameraphones.
They're compact, have a pretty good learning curve for the new user and as the technology improves they can get some decent-resolution images. A few of the higher-end models can also record a few seconds of video.

Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-03-05 07:34 PM
Response to Reply #1
2. Sure with a bit of a mod...

The resolution might not be good enough for some purposes, but I'm sure for others they are fine. However to go covert you need to be able to start recording discretely, and perhaps reorient the lens.

Wouldn't make it through a pat-down, though, say to one of those "recording forbidden" political events.

Anyone know of mod kits for camera phones?

Printer Friendly | Permalink |  | Top
 
Ian David Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-05-05 11:16 PM
Response to Reply #2
6. Bluetooth enabled cellphones have great potential
Edited on Fri Aug-05-05 11:17 PM by IanDB1
You can leave the earpiece behind and stand a few feet away while someone is recorded on your home answering machine.

Also, those two-way family radios have a range of 2-5 miles.

Some of them can be voice-activated.

And have you ever heard just how well some baby monitors can pick-up every sound in a whole house?

Digital voice recorders-- also voice activated-- can record something like 30 hours of sound.

Put a transmitter (voice activated?) somewhere and mate the receiver with a digital voice recorder in the bushes and come back at your leisure.

You'd also be surprised (or not) to see how many people have their computer monitors facing the windows of their offices.

Digital cameras (and camcorders) have a remarkable zoom capability.

And forgetting for a moment about relying on technology, get a copy of The Art of Deception by Kevin Mitnik.

Good old fashioned Social Engineering goes a long way.

The Art of Deception: Controlling the Human Element of Security
by Kevin Mitnick
ISBN: 0471237124

Synopses & Reviews
Publisher Comments:
Kevin Mitnick‛s exploits as a cyber-desperado and fugitive from one of the most exhaustive FBI manhunts in history have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison in 2000, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world‛s most famous hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on businesses–and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a determined con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim, The Art of Deception explores why each attack was so successful–and how it could have been averted–in an engaging and highly readable manner reminiscent of a true-crime novel.

Most importantly, Mitnick redeems his former life of crime by providing specific guidelines for developing protocols, training programs, and manuals to ensure that a company’s sophisticated technical security investment will not be for naught. He shares his advice for preventing security vulnerability in the hope that people will be mindfully on guard for an attack from the gravest risk of all–human nature.

More:
http://www.powells.com/biblio/17-0471237124-1

Printer Friendly | Permalink |  | Top
 
salvorhardin Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Aug-03-05 08:22 PM
Response to Reply #1
3. "Disposable" digital cameras
Edited on Wed Aug-03-05 08:26 PM by salvorhardin
The large drugstore chains have recently started selling "disposable" digital cameras for as little as $10. They can be very easy to hack and some even do primitive video. I would imagine that for about $20-$30 in parts (including the camera), one could be hacked to include a motion sensor and interfaced to your PC. Add an old palm pilot with WIFI and you could probably even do it wireless for under $50. Perhaps these hacks are beyond the average person who has trouble getting their e-mail but if there's a 14 year old kid in the vicinity...

John Maushammer has become a defacto expert at hacking these cameras.
http://www.maushammer.com/systems

Some links for the curious (or the idle).
http://www.pcworld.com/news/article/0,aid,117979,00.asp
http://www.makezine.com/blog/archive/2005/06/make_audio_show_8.html
http://www.maushammer.com/systems/dakotadigital/DakotaDigital.html
http://www.maushammer.com/systems/cvscamcorder/flash.html

On edit: Old CCTV cameras are not that hard to come by and are also quite affordable. As are old webcams.
http://www.cctvtoolbox.co.za/display_prod.php?product_id=6&PHPSESSID=08122d39f24ce8cdd35185345ac91c38
http://www.73.com/a/0034.shtml
Printer Friendly | Permalink |  | Top
 
Ian David Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-05-05 11:05 PM
Response to Original message
4. For a long time I've been advocating "booby-trapped" laptop computers
Not as in exploding booby-traps, but something like this:

1) Evil Doers break into campaign office and steal computers.

2) Evil Doers take computer back to Secret Lair.

3) GPS Device in stolen computer happily phones home.

4) Microphone (and maybe webcam) in stolen computer cheerfully records everything.

5) As laptop travels from point to point, it seeks-out un-secured Wi-Fi points (man, there are a LOT of them) and helpfully transmits data packets (such as the audio recordings it's been making)

6) If stolen laptop is plugged into Evil Computer Network, un-friendly worms and trojan horses spread and infect and monitor Evil Network.

7) If stolen laptop is given access to the internet(s), it transmits a treasure-trove of information about its kidnappers.

8) Stolen laptop contains a "honey-pot" with false and misleading data (not to mention nasty trojans, keyloggers, and viruses).

9) Bonus feature: Laptop rigged to remotely release smoke and/or dye packets upon command.



Printer Friendly | Permalink |  | Top
 
Ian David Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-05-05 11:09 PM
Response to Original message
5. Try to entrap "pro-family" types in sexually compromising situations
Anyone who is above-average attractive and has access to the hang-outs of politicians and activists should try to engage and document them being naughty.

Can you imagine a video of James Dobson watching gay porn and masturbating on your couch?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Dec 26th 2024, 05:26 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Science Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC