You are previewing Raspberry Pi for Secret Agents.
O'Reilly logo
Raspberry Pi for Secret Agents

Book Description

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

  • Detect an intruder on camera and set off an alarm

  • Listen in or record conversations from a distance

  • Find out what the other computers on your network are up to

  • Unleash your Raspberry Pi on the world

In Detail

Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.

Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.

Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.

Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.

Table of Contents

  1. Raspberry Pi for Secret Agents
    1. Table of Contents
    2. Raspberry Pi for Secret Agents
    3. Credits
    4. About the Author
    5. About the Reviewers
    6. www.PacktPub.com
      1. Support files, eBooks, discount offers and more
        1. Why Subscribe?
        2. Free Access for Packt account holders
    7. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Downloading the example code
        2. Errata
        3. Piracy
        4. Questions
    8. 1. Getting Up to No Good
      1. A brief history lesson on the Pi
      2. The ins and outs of the Raspberry Pi
        1. GPIO
        2. RCA video
        3. Audio
        4. LEDs
        5. USB
        6. LAN
        7. HDMI
        8. Power
        9. SD card
      3. Writing Raspbian OS to the SD card
        1. Getting Raspbian
        2. SD card image writing in Windows
        3. SD card image writing in Mac OS X or Linux
      4. Booting up and configuring Raspbian
        1. Basic commands to explore your Pi
      5. Accessing the Pi over the network using SSH
        1. Wired network setup
        2. Wi-Fi network setup
        3. Connecting to the Pi from Windows
        4. Connecting to the Pi from Mac OS X or Linux
      6. The importance of a sneaky headless setup
      7. Keeping your system up-to-date
      8. Summary
    9. 2. Audio Antics
      1. Configuring your audio gadgets
        1. Introducing the ALSA sound system
        2. Controlling the volume
        3. Switching between HDMI and analog audio output
        4. Testing the speakers
        5. Preparing to record
        6. Testing the microphone
          1. Clipping, feedback distortion, and improving sound quality
      2. Recording conversations for later retrieval
        1. Writing to a WAV file
        2. Writing to an MP3 or OGG file
        3. Creating command shortcuts with aliases
        4. Keep your recordings running safely with tmux
      3. Listening in on conversations from a distance
        1. Listening on Windows
        2. Listening on Mac OS X or Linux
      4. Talking to people from a distance
        1. Talking on Windows
        2. Talking on Mac OS X or Linux
      5. Distorting your voice in weird and wonderful ways
        1. Make your computer do the talking
      6. Scheduling your audio actions
        1. Start on power up
        2. Start in a couple of minutes from now
        3. Controlling recording length
        4. Bonus one line sampler
      7. Summary
    10. 3. Webcam and Video Wizardry
      1. Setting up your camera
        1. Meet the USB Video Class drivers and Video4Linux
        2. Finding out your webcam's capabilities
      2. Capturing your target on film
        1. Viewing your webcam in VLC media player
          1. Viewing in Windows
          2. Viewing in Mac OS X
          3. Viewing on Linux
        2. Recording the video stream
          1. Recording in Windows
          2. Recording in Mac OS X
          3. Recording in Linux
      3. Detecting an intruder and setting off an alarm
        1. Creating an initial Motion configuration
        2. Trying out Motion
        3. Collecting the evidence
        4. Viewing the evidence
        5. Hooking up more cameras
          1. Preparing a webcam stream in Windows
          2. Preparing a webcam stream in Mac OS X
          3. Configuring Motion for multiple input streams
          4. Building a security monitoring wall
      4. Turning your TV on or off using the Pi
      5. Scheduling video recording or staging a playback scare
      6. Summary
    11. 4. Wi-Fi Pranks – Exploring your Network
      1. Getting an overview of all the computers on your network
        1. Monitoring Wi-Fi airspace with Kismet
        2. Preparing Kismet for launch
          1. First Kismet session
          2. Adding sound and speech
          3. Enabling rouge access point detection
        3. Mapping out your network with Nmap
      2. Finding out what the other computers are up to
        1. How encryption changes the game
        2. Traffic logging
        3. Shoulder surfing in Elinks
      3. Pushing unexpected images into browser windows
      4. Knocking all visitors off your network
      5. Protecting your network against Ettercap
      6. Analyzing packet dumps with Wireshark
        1. Running Wireshark on Windows
        2. Running Wireshark on Mac OS X
        3. Running Wireshark on Linux
      7. Summary
    12. 5. Taking your Pi Off-road
      1. Keeping the Pi dry and running with housing and batteries
      2. Setting up point-to-point networking
        1. Creating a direct wired connection
          1. Static IP assignment on Windows
          2. Static IP assignment on Mac OS X
          3. Static IP assignment on Linux
        2. Creating an ad hoc Wi-Fi network
          1. Connecting to an ad hoc Wi-Fi network on Windows
          2. Connecting to an ad hoc Wi-Fi network on Mac OS X
      3. Tracking the Pi's whereabouts using GPS
        1. Tracking the GPS position on Google Earth
          1. Preparing a GPS beacon on the Pi
          2. Setting up Google Earth
          3. Setting up a GPS waypoint logger
          4. Mapping GPS data from Kismet
        2. Using the GPS as a time source
        3. Setting up the GPS on boot
      4. Controlling the Pi with your smartphone
      5. Receiving status updates from the Pi
        1. Tagging tweets with GPS coordinates
        2. Scheduling regular updates
      6. Keeping your data secret with encryption
        1. Creating a vault inside a file
      7. Summary
        1. Graduation
    13. Index