Pet chipping

I decided to look into pet microchipping after reading an article about a modern detective who tracked down a married couple who committed fraud then left their home country to avoid the authorities. The detective succeeded where others failed in tracking them down after learning that their expensive dog was chipped. The dog had a unique medical condition requiring specific drugs. He tracked the pet initially via its medical requirements to a veterinary clinic in another county and then upon learning of the pets next visit – with a carer not the owners – they then accessed the animals microchip and were able to ascertain the owners new address leading to arrest.

How does the technology work?

Essentially a microchip the size of a grain of rice coated in a protective layer is injected under the skin of the animal at the back of the neck. Utilising passive radio-frequency identification (RFID) technology that conforms to international standards, the chip can be read by a hand-held scanner generating the power required by the chip to send back a unique 15-digit number. This number can then be fed into various pet databases to access the owner’s details. The start of the number usually indicates the country of origin followed by the microchip manufacturer.

Since the 6th of April 2016, all dogs in the UK must be microchipped, and from the 10th of June 2024 all cats in the UK must also be microchipped. Dogs and cats in the UK found without a chip can lead to a fine for the registered owner.

Those with access to the databases such as vets are not permitted to divulge information about the owner to anyone but the registered owner.

Scanners can be purchased freely as the microchips only store the unique ID number. The real data is stored in the pet databases and generally consist of the pet’s name, the owner’s name, address, and contact details.

Products such as automated dog and cat flaps can contain scanners that can read the microchips as the pet approaches so that only authorised pets may enter or leave the property.

Mythos and Wraith

When I first started creating software for the Commodore Amiga demo scene many many moons ago I did so with two friends known as Mythos and Wraith.

Between us we wrote code, created graphical artwork and digital music, which we assembled into productions known as intros and demos. It lasted a few years then we went our separate ways. I continued for a few more years with other groups of individuals before hanging up my scener hat altogether.

I started wondering what they are up to today, how did their lives turn out? Did they end up with a career in technology as I did, or switch to something else? Are they married with kids? Are they even still alive?

I toyed with the idea of utilising OSINT to track them down so I could answer these questions and maybe even say hi. I can’t remember their real names, only their aliases, but I still have all my Amiga files and a copy of WinUAE, so digging out their names and addresses from back then shouldn’t be too difficult. From there I could use public info and social media to hopefully locate them today.

But why? To see if I could? To satisfy a passing nostalgic thought?

I’ve come to realise recently that people come and go. Throughout your life friends and acquaintances will come into your life, stay a while, then move on. And that’s ok. We are not meant to hold on to everyone we meet, forever, despite Facebook’s original business model. You as a person will change and develop and what connected you to someone at one point in time may no longer be a part of you and if you were to meet that person today you may find that you have nothing in common and would not be friends.

I decided to move on and not dwell on the past. To be thankful for the good times and the memories and to look to the future. Leaving the past in the past.

To Mythos and Wraith I wish you the best wherever you are.

Ways drones could be used and abused

I’ve been thinking about drones recently. I have a friend that races them, a neighbour that has one to map out the local area, and I own a tiny in-door one myself. Drones seem to be growing in popularity and so I started looking into the security implications of drones and noted all the ways that drones could be hacked, used and abused.

Here’s my list:

– Crashed on purpose or flown into obstacles, vehicles, or people.

– Used for remote surveillance, monitoring, eavesdropping, shoulder-surfing of keypad entry use, invasion of personal privacy.

– To steal other drones using techniques such as jamming and spoofing. See Samy Kamkar’s Skyjack experiment as an example.

– To steal on-board data from other drones. Drones have digital storage for video, image, and audio recorded data. This could be stolen. Also the interception of the data streams that a drone sends back to its base station could be intercepted.

– To steal wireless data. Drones can be used to intercept Wifi, Bluetooth, RFID, ZigBee, and any other wireless data by carrying the appropriate hacking tools and communications equipment. The drone can be flown within range of the target communications signals and then spoof and hack its way in. It could even be flown onto an office building roof in order to become a WiFi pineapple device then return to base with no human required to access the target location.

– To deliver contraband across borders, fences, and other restricted areas.

– To hack vehicles by flying above the vehicle and employing vehicle hacking technology.

– To create a communications network. Instead of using the cell towers of a communications company a network of drones with specialist on-board software and equipment could act as a mobile cell network to provide communications for an organisation preventing eavesdropping from the authorities.

– To map out locations and buildings in greater detail than Google streetview and Google Earth can offer.

– To disable security cameras in an area by locating the cameras and using various techniques such as IR to disable the cameras for a period of time before criminals access the location.

– To assist with heists from vehicle hijacks to museum robberies.

Can you think of any others? 

Who called me

Who called me

When you work with computers and possess at least one certification in cyber security, you tend to have friends or family that call or message you on occasion asking you to trace a phone number for them as if you are some form of digital private eye.

The truth is that only the authorities with the assistance of the telecom providers can legally do that. All these websites that say they can trace any number in the world for you are lying. They are just scams after your money. At best they have scraped open source content for numbers and can tell you the network provider, country of origin, and anything that is available online for free. Maybe they’ve concatenated and absorbed phone directories and public domain phone number repositories. They certainly can’t trace an unlisted number for you.

That said, if the number does have a footprint of some kind in the public domain then there are ways of finding it. Using Google Dorking to scour search engine data may uncover something useful. Governmental company registration databases that are open to the public may also reveal data. Whois records, club memberships, company websites, etc.

The phone number is just a character string. Play with the format when searching. For example if you were called by 07709 123456 and you are in the UK you could search for exact string matches of:

07709 123456
07709123456
7709 123456
7709123456
44 07709 123456
44 7709 123456
4407709123456
447709123456

Google for OSINT tools and techniques related to phone numbers for more suggestions.

AI generated music

Spotify has been suggesting a lot of AI generated music of late and I’m getting better at spotting it. Or at least I think I am. I add what I like to my playlist.

When I hear that metallic edge that almost sounds like a distortion to the human voice, almost robotic like certain frequencies have been removed, I think that yes this is AI but I still have to check. Some artists are honest and clearly state that they used AI in its creation. Others even list the AI tools they used to create both the music, lyrics, and supporting artwork. Others you have to dig deeper. A one-person creation that features an entire band plus vocals, sometimes male and female, with amazing artwork and even a music video? AI.

There are of course negatives to AI created music. The creator may have no musical talent whatsoever. They are a master of the prompt only. You can’t see the band live as they don’t exist. Air guitar seems somewhat fake, as there is no actual guitar involved. Just a load of ones and zeroes. But if you enjoy it, what’s the harm?

What are your thoughts on AI generated music?

You can’t take it with you

We acquire so much stuff. Items that are precious to us. Things that are necessary to support day-to-day living and to aid in our comfort. Nik naks and trinkets. Things that need polishing, dusting, caring for. Photographs, family albums, memories. Yet you can take none of it with you. We leave this world with what we brought into it.

This thought comes to mind as I visit the weekend auctions. Rooms full of other peoples stuff. Remnants of their estate, their ‘worldly possessions’. The stuff that their relations and friends didn’t want, but was still precious to the deceased.

When my Grandma’s estate was being sorted I was away. I was asked what I wanted beyond what was left to me in her will. I didn’t need for anything so mentioned a face-cast of a saracen mounted on the wall of the spare bedroom. It used to frighten me as a child during stay-overs. I always requested that it be taken down. It reminded me of my visits to Grandma’s house so for some reason I asked for it. Later I learned that others did something similar. They asked for something that meant something to them, or had monetary value. Everything else, clothing, furniture, kitchenware, nik naks, was left behind for the local council to dispose of.

It’s sad really. But the memory serves to remind me that it’s all just stuff.

You can’t take it with you.

Car parking space dimensions

I drive a large car and find it hard to fit it into a UK parking space. As such I loath car parks with a passion, especially supermarket car parks. Having worked on insurance software I know that a lot of reported accidents occurred in car parks, especially door scratches and dents, or broken wing mirrors due to tight parking spaces.

The requirements for the size of a car parking space were drawn up in the 1970s and they haven’t really changed since. In fact recent studies have found that there are over a hundred vehicle models on the road, including mine, that will not fit within your average car parking space today. Cars are getting bigger. Even with camera assist, both the front and rear of my vehicle overhang. The sides are just inside but the doors will need to open into the adjacent spaces in order for the passengers to get out.

With the price of land being at a premium, car park owners are loath to redraw the spaces to give users more space as it means less vehicle capacity and therefore less earnings.

Isn’t it time that car parking space dimensions were updated to reflect today’s vehicles?

Locked out of a Tesla

A neighbour was locked out of their Tesla. I’m not exactly sure how that happened. They were trying to explain that their phone died and they didn’t have their “card” on them.

Apparently, realising their phone battery was about to die they ran to their car in order to charge it only to fail to reach it in time. The phone won’t turn on and therefore they can’t unlock their car. WTF? Unlike old school vehicles that have a mechanical backup key for getting inside your vehicle if the battery dies, this Tesla owner was out of luck. Unless she could charge her phone she wasn’t getting into her car anytime soon.

OSINT yourself

When learning anything new, knowing where to start can prove a challenge. Do you pay for a course, buy a book, or maybe look online?

With OSINT I recommend starting with yourself. Imagine you are an in-house digital private detective hired by yourself to investigate, well, yourself. Maybe you are about to apply for a high-profile job or are about to be security vetted for some reason. Either way, the client, you, wants to know what information is out there in the wide world about you.

OSINT stands for Open Source INTelligence and relates to the accessing of freely available information sources in order to process the data retrieved in order to obtain some form of intelligence, in this case learning what information is available about your subject online. The subject being you.

It’s a great way to learn OSINT techniques and it can be both fun and illuminating. Good or bad, whatever you find will be useful. If you find good things that you are happy to be out there then great. If you find bad things then at least you now know about them and can do something about them.

Start with search engines like Google. Search for all variations of your name. If you find images of yourself, paste them into reverse image search engines to see where else they may appear. Log and record everything you find. URLs, images, text, everything. Map out your findings and follow every lead. Leave no stone unturned. Your job as an OSINT investigator is to find everything about your client that is publicly available.

Carry out web searches for OSINT tools and techniques. Have a play with the tools as part of your endeavour. Note what is useful and what is not. Start creating your own playbook and make lots of notes. The deeper you dive the more you learn.

Take your time, don’t rush things. Learn how to look up company information, property details, employment history, social network accounts, and so on.

Search for report templates and create something that suits you. Write up your findings with recommendations.

Congratulations! You just got started in OSINT and you had fun doing it. You learned new tools and techniques and you also learned what information about you is freely available. Now action any recommendations and run a periodic check. Plus sign up to OSINT groups, newsletters, and websites and keep learning!