If you’ve gotten into software-defined radio (SDR) in the last five years, you’re not alone. A lot of hackers out there are listening in to the previously unheard. But what do you do when you find an interesting signal and you don’t know what it is? Head on over to the Signal Identification Wiki! You’ll find recordings and waterfall plots for a ton of radio signals categorized by frequency band as well as their use.
Or, conversely, maybe you’ve just got a new radio and you want to test it out. What would be a fun challenge to receive? Signals in the catalog range from the mundane, like this smart home energy meter from California, or a Chrysler tire-pressure monitoring system to (probably) secret military or intelligence transmissions.
If you’re looking at a waterfall plot and you’re not sure what to make of it, the sigidwiki is worth a look. And it’s a wiki, so if you’ve got a cool signal and you want to add it, create an account and get to it!
Thanks to [mkie] for the tip!
Wikiwatcher has just officially released their new tools. We covered their announcement at The Last HOPE just last month. The 2.0 version of Wikiscanner is not ready just yet.
Poor Man’s Checkuser exposes the IPs of quite a few user accounts. There is a wealth of data here which can be used as a base for your own tools. Potential Sockpuppetry is a good example of using this data; it shows what IPs are associated with multiple accounts and could be run by the same person. It takes data from the Poor Man’s Checkuser and arranges it by organization and IP range. Beaver Scope keeps an eye on edits coming out of all specific locations on MIT campus. The author used this list of MIT IPs to monitor MIT’s activity during the Caltech-MIT pranking season. It is able to pinpoint exactly which building an article is being edited from. The team hopes to see people develop new tools from the Poor Man’s Checkuser data.
[Virgil] presented the next version of Wikiscanner at The Last HOPE today. To build the original Wikiscanner, he scanned the monthly database dump of anonymous edits and compared that against a purchased list of known company IP addresses. The 34.5 million edits account for nearly 21% of all edits. The idea was to unearth businesses and groups white washing critical pages. This only handles anonymous edits though. Users could log in to avoid having their IP reversed.
In the new version, [Virgil]’s team developed a Poor Man’s CheckUser. If you spend too much time editing a talk page, your session could end and when you hit save it attaches your IP. Most regular users will then log in and remove their IP. They found 13,000 username/IP address pairs by searching for IPs being removed and replaced with usernames. These are some of the most active users. Using this list, they could potentially uncover sockpuppets or potential collusion by top editors.
Continue reading “HOPE 2008: Wikiscanner 2.0”
Whenever [sprite_tm] sends in his latest project, it’s like getting a Christmas present and a night off. He put together a whiteboard, x/y stepper system, serial interfaced microcontroller and added a webcam with perspective correction for the online view. Me? I’m tempted to build one of these for leaving notes for the wife when I’m out.