Book Image

Raspberry Pi for Secret Agents - Third Edition

Book Image

Raspberry Pi for Secret Agents - Third Edition

Overview of this book

This book is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you’re completely new to Linux, you’ll pick up much of the basics for free. We’ll help you set up your Raspberry Pi Zero, Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You’ll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We’ll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you’ll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, we’ll combine them with a battery pack and GPS for the ultimate off-road spy kit.
Table of Contents (7 chapters)

Be anonymous on the Internet


Any secret agent needs to be stealthy and, well, secret—and that includes their Internet activity. If you suspect that you are being tracked by the authorities, or even advertisers, then you need to make your Internet traffic anonymous while online.

Know your onions

In order to become anonymous on the Internet, we need to set up a Tor router. Tor (which stands for The Onion Router) facilitates anonymity by routing your traffic through a large worldwide network of relays that anonymize and obfuscate your location and web activity, making surveillance and analysis incredibly difficult. For more information about the Tor project see https://www.torproject.org.

The way it works is that we're going to use the Raspberry Pi as a wireless hotspot as we did earlier, but this time we're going to isolate the Wi-Fi network from the wired network and add some routing. The wired Ethernet will be connected to our Internet router on our home LAN. The Tor software will listen for...