TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

GPS tracking device found on an activist's car

610 点作者 SpaceInvader大约 10 年前

24 条评论

tomkinstinch大约 10 年前
Very few companies produce GPS chips. Most devices that include GPS capability do not bother to reinvent the wheel, but instead elect to integrate an existing GPS processing chip. It&#x27;s unlikely the GPS module is integrated with the processor core of this thing. Since it is likely separate, it would be fun to probe the PCB with a logic analyzer to see if there are any exposed serial (or possibly I2C, SPI) traces relaying the NMEA sentences[1] from the GPS module to the processor. If so, false locations could presented by severing the traces and soldering on a synthetic serial (or I2C, SPI) feed at the right logic level (probably 3.3V), from a microcontroller or computer. The hacked feed could even read a real-time clock to &quot;play back&quot; a stored path of locations every day. Attaching an external data feed is likely as simple as dragging a box cutter over the right traces (data, ground) to disrupt them, and then soldering on some 30 gauge wire to the same traces (after sanding off the soldermask and silkscreen). Since most GPS modules output constantly without any control lines, so there may not even be a control scheme to reverse engineer.<p>Note to those designing trackers: if you want to make it difficult, use a board with internal layers and keep the GPS nets on the interior of the board. Doesn&#x27;t make splicing impossible[2], but it would up the difficulty.<p>1. <a href="http://aprs.gids.nl/nmea/" rel="nofollow">http:&#x2F;&#x2F;aprs.gids.nl&#x2F;nmea&#x2F;</a> 2. <a href="http://www.circuitrework.com/guides/4-2-6.shtml" rel="nofollow">http:&#x2F;&#x2F;www.circuitrework.com&#x2F;guides&#x2F;4-2-6.shtml</a>
评论 #9160250 未加载
评论 #9160254 未加载
评论 #9160848 未加载
评论 #9160847 未加载
评论 #9160898 未加载
评论 #9161756 未加载
评论 #9160897 未加载
评论 #9161983 未加载
ladyada大约 10 年前
<a href="http://imgur.com/a/Z1hyd" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;Z1hyd</a> has a few parts labeled<p>theres a main processor which is way overpowered (the big TQFP part) which is covered by a plug-in 2G GSM&#x2F;GPRS modem. You can &#x27;sniff&#x27; the modem control pins, its almost certainly the standard plain &#x27;AT&#x27; command set used for these modems, at 9600 or 57600 baud, 3.3V logic<p>The plug in module looks a lot like a SIM300 or Spreadtrum 5100b. It probably had an IMEI sticker that was pulled off. Theres probably a dozen makers of nearly identical modems during that time period. This one looks fairly old since its a plug-in type. I&#x27;d guess the GSM module is at least 5 yrs old<p>On the other side is a standard 32-pin NAND flash, you could desolder and then use a NAND-reader kit (google etc) to suck the data off. its probably just the GPS coordinates stored between modem data uploads.<p>SIM holder, some crystals, power circuitry, and a (95% sure) uBlox GPS - the uBlox have that funny shape and pinout. uBlox have high sensitivity so a good choice! unclear which generation this us, they&#x27;re up to Neo-8. You could decap it to find out.<p>probably the most fun could be had by first figuring out the RX&#x2F;TX pins from the microcontroller to the GSM&#x2F;GPRS module, then soldering thin wires to that and listening with a UART TTL cable. Put in a new SIM, wait a few seconds for the GSM module to get onto the cell network, then quickly faraday it up and see what website, IP address or phone number the micro is trying to connect to. ymmv tho, might just be a random drop point.<p>(theres a bunch of chips with no clear markings, could be motion&#x2F;accel&#x2F;gyro or other sensors - @ioerror if you post up the #s on each chip it&#x27;ll be easier to tell! :)<p>edit: i thought about the huge coin cell battery backup. its a bit odd, quite large sized! if its well designed, the microcontroller will detect that the battery has been disconnected, and while on backup coin cell power quickly erase the NAND flash and microcontroller memory :(
评论 #9183466 未加载
评论 #9161195 未加载
tacoman大约 10 年前
A friend of mine hired someone to gather data on his cheating wife. A device that looked similar to this was used on her car. $400 for a month of real-time location data. Maybe this has nothing to do with conference this person was attending.
评论 #9162046 未加载
评论 #9161296 未加载
评论 #9162074 未加载
jrockway大约 10 年前
I guess it&#x27;s a sad world when I breathe a sigh of relief upon seeing that this didn&#x27;t take place in the US.<p>I like how the agency gummed over the chip silkscreens so you can&#x27;t see what chips they&#x27;re using. Even though it&#x27;s obvious that one is flash, another is a GPS module, and the third is the micro. And it appears that some scraping will show you the part numbers anyway. Amateur hour.
评论 #9160290 未加载
评论 #9160265 未加载
评论 #9160656 未加载
评论 #9160310 未加载
评论 #9164512 未加载
评论 #9160266 未加载
dingaling大约 10 年前
During the &#x27; Troubles&#x27; in Northern Ireland, chassis inspection mirrors were a common sight.<p>These were large convex mirrors mounted horizontally on castors and with a long handle. They were slid under the car to look for suspicious packages that may have been attached covertly with malicious intent.<p>Very quick to use and were widely issued to individuals who might have been at risk. So it was common to see people using them each morning before heading off to work ( by a different route each day of course ).<p>Sounds like there might be a new market for them.... I should have bought a few hundred when they were being sold as surplus!
评论 #9161337 未加载
评论 #9162190 未加载
cnvogel大约 10 年前
I think one of the first things I&#x27;d try when finding such a device on my premises would be to try and login to the self-service portal of the mobile carrier that issued the SIM card. At least in the case of my phone-service provider (I&#x27;m also located in the EU) this uses the phone number, and a password which can be requested by SMS...<p>In the case of my provider, the permission to use the self-service portal which include the possibility to view&#x2F;change billing addresses and shows all the numbers active on a contract, can, of course, be enabled&#x2F;disabled per telephone number. But it will be worth a try...
评论 #9163211 未加载
SpaceInvader大约 10 年前
Reddit thread: <a href="https://www.reddit.com/r/gadgets/comments/2y5q5g/help_us_identify_this_found_gsmgps_tracking_device/" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;gadgets&#x2F;comments&#x2F;2y5q5g&#x2F;help_us_ide...</a>
serf大约 10 年前
looks like Private Investigator catalog equipment in the states. Big, clunky, and built to suit a million different uses. Dev board + sensors + 3g = a million different reconfigurable spy toys.<p>Although I hope it&#x27;s a three-letter agency, because that&#x27;d make me a bit less frightened of them.<p>Also, I don&#x27;t know why everyone is up-in-arms about the solder job quality. Rip apart a Chinese Futaba-knockoff RC transmitter, dash cam, or counterfeit Lenovo&#x2F;Apple power-brick for similar quality (and that stuff is <i>everywhere</i>). All that anyone cares about is that it passed the bench test. (who cares if it burns up later?)
评论 #9160641 未加载
评论 #9161751 未加载
tlrobinson大约 10 年前
It would be interesting to figure out where the data is being sent. It could probably be done in a variety of ways (JTAG? Replace the SIM card and setup a fake GSM base station? Check your local laws...).<p>It would be pretty ironic if they routed through Tor...
评论 #9160321 未加载
Sanddancer大约 10 年前
I&#x27;d second a motion for scraping off the big chips to get some part numbers, to make it easier to get pinouts to hook up probes and other ways to get it to give up its electronic secrets. Though I am rather unplussed with the soldering job there, and personally would disavow soldering such a mess. Big blobs of solder, real crappy joints, and even a few spots that look heat damaged. More than a bit of me is surprised it even worked in the first place.
JoeAltmaier大约 10 年前
Uh, any smart phone? Many&#x2F;most of us are being tracked.
评论 #9160325 未加载
评论 #9160379 未加载
评论 #9160745 未加载
评论 #9160941 未加载
Zigurd大约 10 年前
This looks pretty amateur. I&#x27;d be asking if there is a specific private sector company that takes an interest in this activist, and has hired a cheap, shady private investigator.<p>The device was probably SMS&#x27;ing location data. There might still be log data in the device that could be extracted via a serial port.
callahad大约 10 年前
Cool! Free SIM card with data!
评论 #9161986 未加载
评论 #9161727 未加载
评论 #9160541 未加载
simcop2387大约 10 年前
Based on the way it&#x27;s laid out and all the unpopulated headers I&#x27;m almost wondering if this is a GSM dev board that someone makes that&#x27;s paired with a GPS daughter card they make. It doesn&#x27;t look quite as purpose built for a tracking application as I would expect, if it was i&#x27;d expect it to be far more compact and have very few test points and headers for the controller. In fact I&#x27;d expect they&#x27;d probably use a smaller controller too to help cut down on power usage, since they&#x27;ve got the large flash chip they can probably store all the data and send it in burst rather than keep the GSM modem powered up all the time which would let it last far longer in the field.<p>In fact even the soldering for the power wires to the strange battery array board looks rather amaturish. I&#x27;m not sure I&#x27;d chalk this up to any agency that&#x27;s got much of a budget for this kind of thing. I think it&#x27;s likely to be some other activist group that&#x27;s in disagreement with this one and wants to dig up dirt (Private Eye maybe?)<p>Edit: correction, what I thought was a bunch of batteries on a board looks like it&#x27;s actually the magnets that held it in place on the car. D&#x27;oh. Either way it still looks odd that it&#x27;s built like a set of development boards by a chip manufacturer.
评论 #9160529 未加载
评论 #9160532 未加载
评论 #9160381 未加载
mschuster91大约 10 年前
Seriously, these things can be bought COTS in WAY better shape for 35€ ( <a href="http://www.pearl.de/a-PX3490-1511.shtml" rel="nofollow">http:&#x2F;&#x2F;www.pearl.de&#x2F;a-PX3490-1511.shtml</a> ). If you want to hide it, just wrap it in black tape. I wonder who chose to self-build this thing with cheap-ass kits being available...
评论 #9161494 未加载
lambeosaurus大约 10 年前
I want to write some code that will take these systems and send bogus GPS data the spells out FUCK YOU.
评论 #9162421 未加载
pmccall777大约 10 年前
They missed a golden opportunity to attach the device to a politician, high ranking official, or executive&#x27;s car.
评论 #9160392 未加载
nickysielicki大约 10 年前
Shouldn&#x27;t it be possible to open that thing up and see where&#x2F;who it&#x27;s reporting the data to?
boklm大约 10 年前
An article in Spanish: <a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/dispositivo-rastreador-pusieron-activista-privacidad_0_363964058.html" rel="nofollow">http:&#x2F;&#x2F;www.eldiario.es&#x2F;turing&#x2F;vigilancia_y_privacidad&#x2F;dispos...</a>
icco大约 10 年前
Looks different than the FBI one iFixit tore down at least: <a href="https://www.ifixit.com/Teardown/Tracking+Device+Teardown/5250" rel="nofollow">https:&#x2F;&#x2F;www.ifixit.com&#x2F;Teardown&#x2F;Tracking+Device+Teardown&#x2F;525...</a>
chinathrow大约 10 年前
Any words on the IMEI in use? Maybe some nice folks can then leak some info.
skwuent大约 10 年前
Forget Tesla, <i>that</i> is what a real hacker&#x27;s car looks like.
unable大约 10 年前
Better call Saul
throwawayaway大约 10 年前
soon these will be built in, a great win for humanity.
评论 #9160782 未加载
评论 #9160400 未加载