Horseless Carriage Exploits And Eavesdropping Defenses presented at SOURCE Boston 2009

by James Atkinson,

Tags: Security Exploitation

Summary : Exploration of the modern eavesdropping threat posed by automobiles and other motor vehicles, common penetration points exploited by eavesdroppers and spies, methods of detecting such penetrations. The use, misuse, and exploitation of cellular communications, tracking devices, and related systems will also be presented including examples of prior penetrations, hacks, and attacks. Will include information on specific methods which may be used by both the engineer and the layman to detect, locate, and counter fairly sophisticated vehicle based surveillance systems.