Raspberry Pi for Secret Agents


Raspberry Pi for Secret Agents
eBook: $14.99
Formats: PDF, PacktLib, ePub and Mobi formats
$12.74
save 15%!
Print + free eBook + free PacktLib access to the book: $44.98    Print cover: $29.99
$29.99
save 33%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • Unleash your Raspberry Pi on the world

Book Details

Language : English
Paperback : 152 pages [ 235mm x 191mm ]
Release Date : April 2013
ISBN : 1849695784
ISBN 13 : 9781849695787
Author(s) : Stefan Sjogelid
Topics and Technologies : All Books, Other

Table of Contents

Preface
Chapter 1: Getting Up to No Good
Chapter 2: Audio Antics
Chapter 3: Webcam and Video Wizardry
Chapter 4: Wi-Fi Pranks – Exploring your Network
Chapter 5: Taking your Pi Off-road
Index
  • Chapter 1: Getting Up to No Good
    • A brief history lesson on the Pi
    • The ins and outs of the Raspberry Pi
      • GPIO
      • RCA video
      • Audio
      • LEDs
      • USB
      • LAN
      • HDMI
      • Power
      • SD card
    • Writing Raspbian OS to the SD card
      • Getting Raspbian
      • SD card image writing in Windows
      • SD card image writing in Mac OS X or Linux
    • Booting up and configuring Raspbian
      • Basic commands to explore your Pi
    • Accessing the Pi over the network using SSH
      • Wired network setup
      • Wi-Fi network setup
      • Connecting to the Pi from Windows
      • Connecting to the Pi from Mac OS X or Linux
    • The importance of a sneaky headless setup
    • Keeping your system up-to-date
    • Summary
    • Chapter 2: Audio Antics
      • Configuring your audio gadgets
        • Introducing the ALSA sound system
        • Controlling the volume
        • Switching between HDMI and analog audio output
        • Testing the speakers
        • Preparing to record
        • Testing the microphone
          • Clipping, feedback distortion, and improving sound quality
      • Recording conversations for later retrieval
        • Writing to a WAV file
        • Writing to an MP3 or OGG file
        • Creating command shortcuts with aliases
        • Keep your recordings running safely with tmux
      • Listening in on conversations from a distance
        • Listening on Windows
        • Listening on Mac OS X or Linux
      • Talking to people from a distance
        • Talking on Windows
        • Talking on Mac OS X or Linux
      • Distorting your voice in weird and wonderful ways
        • Make your computer do the talking
      • Scheduling your audio actions
        • Start on power up
        • Start in a couple of minutes from now
        • Controlling recording length
        • Bonus one line sampler
      • Summary
      • Chapter 3: Webcam and Video Wizardry
        • Setting up your camera
          • Meet the USB Video Class drivers and Video4Linux
          • Finding out your webcam's capabilities
        • Capturing your target on film
          • Viewing your webcam in VLC media player
            • Viewing in Windows
            • Viewing in Mac OS X
            • Viewing on Linux
          • Recording the video stream
            • Recording in Windows
            • Recording in Mac OS X
            • Recording in Linux
        • Detecting an intruder and setting off an alarm
          • Creating an initial Motion configuration
          • Trying out Motion
          • Collecting the evidence
          • Viewing the evidence
          • Hooking up more cameras
            • Preparing a webcam stream in Windows
            • Preparing a webcam stream in Mac OS X
            • Configuring Motion for multiple input streams
            • Building a security monitoring wall
        • Turning your TV on or off using the Pi
        • Scheduling video recording or staging a playback scare
        • Summary
        • Chapter 4: Wi-Fi Pranks – Exploring your Network
          • Getting an overview of all the computers on your network
            • Monitoring Wi-Fi airspace with Kismet
            • Preparing Kismet for launch
              • First Kismet session
              • Adding sound and speech
              • Enabling rouge access point detection
            • Mapping out your network with Nmap
          • Finding out what the other computers are up to
            • How encryption changes the game
            • Traffic logging
            • Shoulder surfing in Elinks
          • Pushing unexpected images into browser windows
          • Knocking all visitors off your network
          • Protecting your network against Ettercap
          • Analyzing packet dumps with Wireshark
            • Running Wireshark on Windows
            • Running Wireshark on Mac OS X
            • Running Wireshark on Linux
          • Summary
          • Chapter 5: Taking your Pi Off-road
            • Keeping the Pi dry and running with housing and batteries
            • Setting up point-to-point networking
              • Creating a direct wired connection
                • Static IP assignment on Windows
                • Static IP assignment on Mac OS X
                • Static IP assignment on Linux
              • Creating an ad hoc Wi-Fi network
                • Connecting to an ad hoc Wi-Fi network on Windows
                • Connecting to an ad hoc Wi-Fi network on Mac OS X
            • Tracking the Pi's whereabouts using GPS
              • Tracking the GPS position on Google Earth
                • Preparing a GPS beacon on the Pi
                • Setting up Google Earth
                • Setting up a GPS waypoint logger
                • Mapping GPS data from Kismet
              • Using the GPS as a time source
              • Setting up the GPS on boot
            • Controlling the Pi with your smartphone
            • Receiving status updates from the Pi
              • Tagging tweets with GPS coordinates
              • Scheduling regular updates
            • Keeping your data secret with encryption
              • Creating a vault inside a file
            • Summary
              • Graduation

            Stefan Sjogelid

            Stefan Sjogelid grew up in 1980s Sweden, getting hooked on 8-bit consoles, Amigas and BBSes. With a background in system and network administration, he packed his bags for Southeast Asia and continued to work in IT for many years, before love and a magic 8-ball told him to seek new opportunities in Canada. The Raspberry Pi is the latest gadget to grab Stefan's attention, and after much tinkering and learning a great deal about the unique properties of the Pi, he launched the "PiLFS" (http://www.intestinate.com/pilfs) website, which teaches readers how to build their own GNU/Linux distribution and applications that are particularly useful on the Raspberry Pi.
            Sorry, we don't have any reviews for this title yet.

            Code Downloads

            Download the code and support files for this book.


            Submit Errata

            Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.


            Errata

            - 2 submitted: last submission 11 Mar 2014

            Errata type: Code | Page number: 54

            SourceForge has changed their source code snapshot download procedures. Hence, make the following changes:

            On page 54, on step 2, change
            wget http://mjpg-streamer.svn.sourceforge.net/viewvc/mjpg-streamer/mjpg-streamer/?view=tar -O mjpg-streamer.tar.gz
            to
            wget http://www.intestinate.com/mjpg-streamer.tar.gz

             

            Errata type: Code | Page number: 80

             

            In Step 4, the following line of code:
            pi@raspberrypi ~/kismet-2013-03-R1b $ cd .. && rm -rf kismet-2011-03-R2

            should actually read:
            pi@raspberrypi ~/kismet-2013-03-R1b $ cd .. && rm -rf kismet-2013-03-R1b

            Sorry, there are currently no downloads available for this title.

            Frequently bought together

            Raspberry Pi for Secret Agents +    C Programming for Arduino =
            50% Off
            the second eBook
            Price for both: €20.39

            Buy both these recommended eBooks together and get 50% off the cheapest eBook.

            What you will learn from this book

            • Install and configure Raspbian OS for maximum mischief
            • Schedule a prank to happen when your foe least expects it
            • Listen in or talk to people from a distance
            • Detect an intruder with motion detection and set off an alarm
            • Distort your voice in weird and wonderful ways
            • Push unexpected images into browser windows
            • Knock all visitors off your Wi-Fi network
            • Control the Pi with your smartphone
            • Keep your data secret with encryption

            In Detail

            Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.

            Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.

            Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.

            Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.

            Approach

            A playful, informal approach to using the Raspberry Pi for mischief!

            Who this book is for

            Raspberry Pi for Secret Agents is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along and if you’re completely new to Linux, you’ll pick up much of the basics for free.

            Apart from the Raspberry Pi board itself, a USB microphone and/or a webcam is required for most of the audio/video topics and a Wi-Fi dongle is recommended for the networking examples. A Windows/Mac OS X/Linux computer (or second Raspberry Pi) is also recommended for remote network access.

            Code Download and Errata
            Packt Anytime, Anywhere
            Register Books
            Print Upgrades
            eBook Downloads
            Video Support
            Contact Us
            Awards Voting Nominations Previous Winners
            Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
            Resources
            Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software