![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Grant Bugher - Detecting Bluetooth Surveillance Systems
DEF CON 22 [Materials] Speeches from the Hacker Convention.
English - December 13, 2014 21:48 - 28.1 MBTechnology Education How To def con defcon hacking hacker conference computer security security research defcon 22 def con 22 dc-22 dc22 Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Bugher/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf
Detecting Bluetooth Surveillance Systems
Grant Bugher PERIMETER GRID
Departments of Transportation around the United States have deployed "little white boxes" -- Bluetooth detectors used to monitor traffic speeds and activity. While they're supposedly anonymous, they detect a nearly-unique ID from every car, phone, and PC that passes by. In this presentation, I explore the documentation on these surveillance systems and their capabilities, then build a Bluetooth detector, analyzer, and spoofer with less than $200 of open-source hardware and software. Finally, I turn my own surveillance system on the DOT's and try to detect and map the detectors.
Grant Bugher has been hacking since the early 90’s and working professionally in information security for the last 9 years. He is currently a security architect for a cloud computing provider, and has previously been a program manager and software engineer on a variety of widely-used developer tools and platforms. Grant is a prior speaker at BlackHat USA and a regular DefCon attendee since DefCon 16. Most of his research and work is on cloud compute and storage platforms, application security, and detecting attacks against web-scale applications.
Twitter: @fishsupreme
Web: http://perimetergrid.com