Fake PS3 Tracks Thieves All The Way Home

ps3_tracking_system

One of [Wayne’s] relatives had their house robbed during a blizzard/extended power outage, and as is typically the case, none of the stolen items were recovered. His nephew’s PS3 was among the pilfered belongings, which didn’t sit well with him. Taking a cue from police “bait cars”, he thought it would be cool to fit a dummy game console with a tracking device, should anything similar happen in the future.

He bought a hollowed out PS3 shell on eBay, filling it with an Arduino, an accelerometer, a GPS sensor, a small GSM modem with a prepaid SIM card, and a reasonably sized LiPoly battery. The system usually sits in a sleeping state, but when the accelerometer senses motion, the Arduino powers up the GSM modem and sends an SMS security alert to his mobile phone. Using his phone to control the tracking system via SMS, he can request GPS coordinates and directional information, which can then be relayed to the police.

His tracking system is a great idea since hawking stolen game consoles are easy money for thieves. If there happens to be a string of robberies in your neighborhood, you could certainly rest a little bit easier knowing that your Playstation doppelganger will let you know if someone is looting your house.

Passive RFID Tag Cloning

Here’s an open source RFID cloner design that is about the same size as a standard RFID key card. It doesn’t need a battery to capture key codes, just the magnetic field generated by an RFID reader. You can see the functionality demonstrated in the video after the break. By holding the bottom button as the cloner is moved in range of the RFID reader, the microcontroller goes into learning mode. Now just hold up the card you wish to clone and the LED just above the buttons will light up when it has captured the code. Now the device will act just as the original RFID tag did.

This was developed by [Ramiro], the same person who built the barebones RFID emulator we saw a few days ago. When researching that story we complete skipped over this gem. He’s posted a ton of information on the tag itself. It doesn’t look like he has any PCBs or kits left, but the schematic and code are available for download. You should check in on the design considerations section because it discusses the read/write function that isn’t built into the current version. That’s why you see some add-on components on the hardware used in the demo video.

It seems like this is a lot more user-friendly than the last RFID spoofer we looked at.

Continue reading “Passive RFID Tag Cloning”

rfid_door_lock_tutorial

Easily Movable RFID Door Lock Is Great For Dorm Rooms

One of the first things that [Eric] hacked together when he got to college was an RFID door locking system. He found that he was often in a rush to get in and out of his dorm room, and that using a simple wireless key was a great way to streamline his days.

Over the years, he has refined his design, and while his original prototype was functional, it was a bit rough around the edges. In the video posted on his site, he thoroughly explains how his system was built, and shows off the revisions he has made over time. One key consideration when building this system was the fact that the installation had to be non-permanent. Since schools typically frown on physically altering your rooms, he found a non-intrusive means to mount his system in the way of zip ties and foam board.

His RFID door lock looks to work quite nicely, and we especially like the inclusion of the reed switch to ensure that the system knows if the door has been opened or not. If you have about half an hour to spare and are interested in building an RFID entry system of your own, be sure to check out [Eric’s] video below for all the details.

Continue reading “Easily Movable RFID Door Lock Is Great For Dorm Rooms”

Security System Gives You A Call When It Senses Intruders

gsm_motion_detector_alarm_system

[Dimitris] decided to build a homemade alarm system, but instead of triggering a siren, sending an SMS message, or Tweeting about an intrusion, he preferred that his system call him when there was trouble afoot. He says that he preferred a call over text messaging because there are no charges associated with the call if the recipient does not pick up the line, which is not the case with SMS.

The system is based around an off the shelf motion detector that was hacked to work with an old mobile phone. The motion detector originally triggered a siren, but he stripped out the speaker and wired it to a bare bones Arduino board he constructed. The Arduino was in turn connected to the serial port of an unused Ericssson T10s mobile phone. This allows the Arduino to call his mobile phone whenever the motion detector senses movement.

The system looks to be quite useful, and while [Dimitris] didn’t include all of the code he used, he says others should be able to replicate his work without too much trouble.

Intel’s New Way Of Creating Randomness From Digital Orderliness

Random number generation is a frequent topic of discussion in projects that involve encryption and security. Intel has just announced a new feature coming to many of their processors that affect random number generation.

The random number generator, which they call Bull Mountain, marks a departure from Intel’s traditional method of generating random number seeds from analog hardware. Bull Mountain relies on all-digital hardware, pitting two inverters against each other and letting thermal noise tip the hand in one direction or the other. The system is monitored at several steps along the way, tuning the hardware to ensure that the random digits are not falling more frequently in one direction or the other. Pairs of 256-bit sequences are then run through a mathematical process to further offset the chance of predictability, before they are then used as a pseudorandom number seed. Why go though all of this? Transitioning to an all-digital process makes it easier and cheaper to reduce the size of microchips.

A new instruction has been added to access this hardware module: RdRand. If it works as promised, this should remove the need for elaborate external hardware as a random number source.

[via Reddit]

Knock Lock With Logic Chips

[Eric] needed a project for his digital logic design class, and decided on a lock that open in response to a specific pattern of knocks. This is a fairly common project that we’ve seen a few builds with ‘knock locks,’ but this one doesn’t use a microcontroller. Instead, it uses individual logic chips.

The lock senses the knocks with a piezo, just like every other build we’ve seen. Unlike the other builds, the knock pattern is then digitized and stored in an EEPROM. [Eric] only used 12 chip for this build, a feat he could accomplish with a few digital tricks, like making an inverter by tying one XOR input high.

We’ve seen a 555-based knock lock before, but getting the timing right with that seems a little maddening. [Eric]’s build seems much more user-friendly, and has the added bonus of being programmed by knocking instead of turning potentiometers. Check out [Eric]’s knock lock after the break.

Continue reading “Knock Lock With Logic Chips”

Project 25 Digital Radios (law Enforcement Grade) Vulnerable To The IM-ME

Would you believe you can track, and even jam law enforcement radio communications using a pretty pink pager? It turns out the digital radios using the APCO-25 protocol can be jammed using the IM-ME hardware. We’ve seen this ‘toy’ so many times… yet it keeps on surprising us. Or rather, [Travis Goodspeed’s] ability to do amazing stuff with the hardware is what makes us perk up.

Details about this were presented in a paper at the USENIX conference a few weeks ago. Join us after the break where we’ve embedded the thirty-minute talk. There’s a lot of interesting stuff in there. The IM-ME can be used to decode the metadata that starts each radio communication. That means you can track who is talking to whom. But for us the most interesting part was starting at about 15:30 when the presenter, [Matt Blaze], talked about directed jamming that can be used to alter law enforcement behavior. A jammer can be set to only jam encrypted communications. This may prompt an officer to switch off encryption, allowing the attackers to listen in on everything being said to or from that radio.

Continue reading “Project 25 Digital Radios (law Enforcement Grade) Vulnerable To The IM-ME”