Beyond GPS - Neogeograpy Data Collection

30
Beyond GPS Neogeography Data Collection Andrew Turner - [email protected]

description

The future of ad-hoc, crowd-sourced, amateur geographic data collection including: aerial imagery, environmental sensors, geolocation, and satellite IM.

Transcript of Beyond GPS - Neogeograpy Data Collection

Page 1: Beyond GPS - Neogeograpy Data Collection

Beyond GPSNeogeography Data Collection

Andrew Turner - [email protected]

Page 2: Beyond GPS - Neogeograpy Data Collection

OpenStreetMap

Page 3: Beyond GPS - Neogeograpy Data Collection

OpenStreetMap

Page 4: Beyond GPS - Neogeograpy Data Collection

What’s Next?

Page 5: Beyond GPS - Neogeograpy Data Collection

Tracking

Page 6: Beyond GPS - Neogeograpy Data Collection

WiFi

Page 7: Beyond GPS - Neogeograpy Data Collection

gsmloc

Page 8: Beyond GPS - Neogeograpy Data Collection

nike+

Page 9: Beyond GPS - Neogeograpy Data Collection

Figure 10: A gumstix-based Nike+iPod surveillancedevice with WiFi wireless capabilities.

adversary can reduce the cost of this module by omittingthe wifistix.

4.5 Exploiting the iPodUsing o! the shelf hardware, we created another surveillancedevice that requires little hardware modification to log andview Nike+iPod sensor activity. We used a desktop com-puter to install iPod Linux [18] on a third-generation iPod.We then recompiled our iMote2 logging software using theiPod Linux toolchain. The only hardware modification isthat the serial send and receive lines on the remote controlport at the top of the iPod must be connected to the seriallines at the bottom of the iPod in the dock connector. Thiscan be achieved with a dock connector break-out board [16].The breakout board allows one to plug in the Nike+iPod re-ceiver (or any iPod accessory) to the iPod though the break-out board while exposing all of the connector pins, includingserial send and receive, for soldering.

Running our application under iPod Linux with the receiverplugged into the iPod, we can now display on the screenof the iPod what sensors are nearby and log sensor events(UID and timestamp) to the harddrive of the iPod for latersynchronization with a central database. This allows anattacker to use an older third-generation iPod as a surveil-lance device; the older iPod can be obtained at a discountfrom places like eBay. A natural extension of this applica-tion would be to use a text-to-speech software package sothat one can wear headphones connected to the iPod andbe notified by audio of what Nike+iPod sensors or peopleare nearby.

If the iPod Linux community figures out how to use theserial port in the dock connector of the third-generationiPod, or any other iPod with a dock connector running iPodLinux, an attacker could track Nike+iPod sensors withoutany hardware modification at all.

4.6 A Distributed Surveillance System

Figure 11: A screenshot of our GoogleMaps-basedsurveillance web application.

To illustrate the power of aggregating sensor informationfrom multiple physical locations, we created a GoogleMaps-based web application. Our web application uses and dis-plays the sensor event data uploaded to a central SQL serverfrom multiple data sources. Currently, the data sourcesmay be our Serial Communication Tool, iMote2 applica-tion, gumstix application, or iPod Linux application. SeeFigure 11.

In real-time mode, sensors’ UIDs are overlayed in hex on aGoogleMaps map at the location the sensor is seen. Whenthe sensor is no longer present at that location, the UIDdisappears. Optionally, digital pictures taken by a laptopwhen the sensor is first seen can be overlayed instead ofthe UID. Currently, the Serial Communication Tool and thegumstixs can upload data in real-time, but it is also possibleto create a network of multiple iMote2 nodes that are alsocapable of uploading data to the server in real-time. Inhistory mode, the web application allows the user to selecta timespan and show all sensors recorded in that timespan.For example, one could select the timespan between noonand 6pm on a given day; all sensors seen that afternoon willbe overlayed on the map at the appropriate location.

This application would allow many individuals to track peo-ple of interest. An attacker might also use this tool to estab-lish patterns of presence. If many attackers with receiverscooperated, this software and website would allow the track-ing and correlation of many people with sensors.

5. EXAMPLE SCENARIOSHaving described our basic attack tools in Section 4, we arenow in a position to discuss how one might use or refineour attack tools for particular surveillance and adversarialapplications. We do not intend for the following to be anexhaustive list of all possible attack scenarios. Rather, thegoal of the following discussion is to highlight the breadthof the types of scenarios that exist.

nike+

the packet level (including checksum verification); and log-ging what sensors have been seen and when. See Figure 8.Logs for multiple serial port traces are interleaved so thatone may see the data exchange or protocol of two devices(in our case, the iPod and the receiver).

Our tool also provides a graphical interface for: sending andreceiving binary data in hex format over up to two serialports; viewing hex and ASCII representation of incomingpackets; and viewing what sensors have been seen and whennew packets for those sensors arrive. Our sensor visualiza-tion consists of a blue rectangle for each seen sensor withits UID in hex and the last time it was seen. Each timethe sensor is seen the box for that sensor becomes red andslowly becomes blue (from top to bottom) over the follow-ing five seconds. This allows one to get a sense of whichawake sensors are in range and how many of their packetsare arriving uncorrupted.

Optionally, our tool can take a picture whenever a new sen-sor is discovered using most USB cameras and make thatphoto the background of the blue box in the sensor visual-ization. This application can also serve as a data collectionnode in a larger surveillance network. To support this task,the tool can upload to a SQL server sensor events includingUID, optional photo, timestamp, latitude, and longitude.(Latitude and longitude are currently set manually by theuser; one could, however, imagine linking a bluetooth GPSreceiver so that a mobile receiver on a car or bike could doaccurate data collection.)

The tool can also SMS or email sensor information to users.This tool is implemented in approximately 2000 lines of C#and XAML on Microsoft .NET 3.0 for Microsoft WindowsXP or later.

4.3 Intel Motes

In addition to our serial communication tool for Windows wehave also created an embedded module for logging and track-ing Nike+iPod sensors using version 2 of the Intel Motes(iMote2). This module consists of an iMote2, an unmodifiedNike+iPod receiver, female iPod connector, and an iMote2utility daughter board with bluetooth. The assembled pack-age is 5cm x 3.8cm x 2.5cm, weighs 2.3 ounces, and has astorage capacity of 2GB via a Mini Secure Digital card.

The iMote2 runs the Linux operating system and our soft-ware is written in C. The iMote2 communicates with thereceiver using a serial port. On boot, the iMote2 sends ini-tialization and link commands to the receiver and beginslogging sensor events to a file. Optionally, the software canturn on an LED when the iMote2 detects that one or moreprespecified sensors are nearby. The set of target sensors isspecified in a configuration file. One can imagine using theLED-based alarm as a discrete mechanism for visually noti-fying a user when a target victim’s sensor is nearby. Thereare obvious audio (buzzer) and physical (vibrate) extensions.

We have instrumented our iMote2 to communicate the UIDsof sensors in range to a Microsoft SPOT Watch over blue-tooth. Using our system, an adversary could put the iMote2and receiver in his or her backpack, purse, or pocket, andstill continuously monitor information about nearby sensors

Figure 9: A Microsoft SPOT Watch receivingNike+iPod sensor IDs from an iMote2 over wirelessbluetooth.

on his or her watch. See Figure 9.

The sensor events logged to file can also be manually up-loaded to a central server for aggregation with sensor infor-mation from the Serial Communication Tool. A straight-forward extension to this device would be for the iMote2to obtain real-time location information from a bluetoothGPS sensor; this would enable an attacker to collect accu-rate sensor location information while the attacker is mo-bile. Another straightforward extension would be to createa large, distributed surveillance sensor network consisting ofmultiple iMote2 nodes, and to upload surveillance data inreal-time to some central SQL server. Rather than imple-ment this latter capability in our iMote2s, we do so with ourgumstix in Section 4.4.

4.4 Gumstixs

We have also implemented a cheap Nike+iPod surveillancedevice using the Linux-based gumstix computers. This mod-ule consists of an unmodified $29 Nike+iPod receiver, a $109gumstix connex 200xm motherboard, a $79 wifistix, a $27.50gumstix breakout board, and a $2.95 female iPod connector.The assembled package is 8cm x 2.1cm x 1.3cm and weighs1.1 ounces; see Figure 10.

Our gumstix-based module runs the same surveillance soft-ware that our iMote2s run, except that (1) the software onthe gumstix module uses WiFi to wirelessly transmit real-time surveillance data to a centralized back-end server and(2) our gumstixs do not pair with a Microsoft SPOT Watch.The real-time reporting capability allows the gumstix mod-ule to be part of a larger real-time surveillance system. If anadversary does not need this real-time capability, then the

Page 10: Beyond GPS - Neogeograpy Data Collection

RFID

Page 11: Beyond GPS - Neogeograpy Data Collection

AIS

Page 12: Beyond GPS - Neogeograpy Data Collection

Imagery

Page 13: Beyond GPS - Neogeograpy Data Collection

Quakr

Page 14: Beyond GPS - Neogeograpy Data Collection

Quakr

Page 15: Beyond GPS - Neogeograpy Data Collection

OpenStreetViewhttp://icanhascheezburger.com/2007/06/19/o-hai-googlz/

Page 16: Beyond GPS - Neogeograpy Data Collection

Kite Photography

Page 17: Beyond GPS - Neogeograpy Data Collection

Kite Photography

Page 18: Beyond GPS - Neogeograpy Data Collection

DIYDrones

Page 19: Beyond GPS - Neogeograpy Data Collection

Pict’Earth

+ =

Page 20: Beyond GPS - Neogeograpy Data Collection

Pict’Earth

Page 21: Beyond GPS - Neogeograpy Data Collection

OpenAerialMap

Page 22: Beyond GPS - Neogeograpy Data Collection

Environmental

Page 23: Beyond GPS - Neogeograpy Data Collection

Urban Atmospheres

Page 24: Beyond GPS - Neogeograpy Data Collection

AIR

Page 25: Beyond GPS - Neogeograpy Data Collection

PigeonBlog

Page 27: Beyond GPS - Neogeograpy Data Collection

BioMapping

Page 28: Beyond GPS - Neogeograpy Data Collection

Satellites

Page 29: Beyond GPS - Neogeograpy Data Collection

GeoBliki