NYC CCTV Scouting

nypd

On a recent trip to New York City, [sherri] noticed the abundant “NYPD Security Camera” signage. She Ò on her little sousveillance tour and did some digging to learn more about the system. According to a recent NY Post article, the city intends to have 2,000 cameras installed by 2009. Each unit has at least two cameras, an onboard DVR, battery backup, a webserver, and wireless connection. The CrimeEye product line is manufactured by Total Recall—the people who brought you BABYWATCH. While the company site doesn’t list any specs, we found a price list that was provided to New York State. Each unit lists for $28-39K. They can have image sensors up to 2 megapixels, hold 30fps video for 5-15days, and transmit wirelessly on the 4.9GHz public safety band.

[sherri] wonders what systems are in place to guarantee the security of the camera network and to make sure the data is handled properly. We’ve seen bad implementations of cameras with webservers
in the past. She suggests a third-party system to verify security, operation, and storage. Right now there’s no reason the government won’t use footage for invasive data mining. As a publicly funded system monitoring public areas, we see no reason why the video streams from these devices shouldn’t be widely available.

[Thanks Tendency]

Android Adds A2DP, AVRCP Bluetooth And More

tmobileg1

While working towards open-sourcing Android, the team continued to work on new features in their own private development branch. These have now been published publicly in the “cupcake” branch. There’s a lot of interesting new features and bug fixes included. We’ve got a rundown of many of the significant additions after the break.

Continue reading “Android Adds A2DP, AVRCP Bluetooth And More”

WiFi Streaming Radio

wifiradio

[Jeff] is continuing to work on his WiFi streaming radio project and is now into part 7. The reason it’s taken so long is because he’s bothering to document every single piece of the system instead of assuming too much of the reader. The core of the system is an Asus WL-520GU wireless router. It is supported by OpenWRT and has a USB port for use with an external audio card. mpd, Music Player Daemon, is used for playback. This latest part features adding an LCD display for the current track. The router board already has points for the serial port, so it’s just a matter of adding an AVR to talk to the LCD. The next step is building a simple user interface and then boxing everything up. You can view a video of the display below.

Continue reading “WiFi Streaming Radio”

Wearable XBee Morse Code Keyer

xbeeglove

NYC Resistor hosted a wearable wireless workshop today. It was taught by [Rob Faludi] and [Kate Hartman]. They brought along their recently released LilyPad XBee breakout boards. The goal of the class was to use the digital radios to build wireless communication gloves. Above, you can see the conductive thread sewn into the fingertips to key the device. The signal is transmitted to the other glove, which flashes an indicator LED so you can communicate using Morse code.

Scratch Built RFID Tags

rfid

[nmarquardt] has put up an interesting instructable that covers building RFID tags. Most of them are constructed using adhesive copper tape on cardstock. The first version just has a cap and a low power LED to prove that the antenna is receiving power. The next iteration uses tilt switches so the tag is only active in certain orientations. The conclusion shows several different variations: different antenna lengths, conductive paint, light activated and more.

New WPA TKIP Attack

wifibox

[Martin Beck] and [Erik Tews] have just released a paper covering an improved attack against WEP and a brand new attack against WPA(PDF). For the WEP half, they offer a nice overview of attacks up to this point and the optimizations they made to reduce the number of packets needed to approximately 25K. The only serious threat to WPA so far has been the coWPAtty dictionary attack. This new attack lets you decrypt the last 12 bytes of a WPA packet’s plaintext and then generate arbitrary packets to send to the client. While it doesn’t recover the WPA key, the attacker is still able to send packets directly to the machine they’re attacking and could potentially read back the response via an outbound connection to the internet.

[photo: niallkennedy]

[via SANS]

Arduino RC Airplane

arduino_airplane

[Olivier] told us about this fantastic project where he built his own RC airplane. The airplane itself is nothing special, it is the controls that are worth paying attention to. He used an Arduino Diecemilla , some XBee transceivers, and a SparkFun Wee. The main site is a general overview, but there are links to more detailed breakdowns of how to build some of the parts. There are several videos of him flying it as well.