Book Image

Raspberry Pi for Secret Agents - Third Edition

Book Image

Raspberry Pi for Secret Agents - Third Edition

Overview of this book

This book is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along, and if you’re completely new to Linux, you’ll pick up much of the basics for free. We’ll help you set up your Raspberry Pi Zero, Raspberry Pi 2 and Raspberry Pi 3 and guide you through a number of pranks and secret agent techniques that are so inconspicuous yet high on mischief. You’ll learn how to configure your operating system for maximum mischief and start exploring audio, video, or Wi-Fi techniques. We’ll show you how to record, listen, or talk to people from a distance and how to set up your own phone network. Then, you’ll plug in your webcam and set up a motion detector with an alarm and find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, we’ll combine them with a battery pack and GPS for the ultimate off-road spy kit.
Table of Contents (7 chapters)

Summary


We kicked off our final chapter with a guide to the Raspberry Pi's GPIO connector and how to safely connect peripherals to it. We followed that up by connecting a laser sensor module to our Pi to create a rather cool laser trip wire that could alert you when the laser beam is broken.

Following along the same theme, we also connected a passive infrared motion detector to our Raspberry Pi, which observed an area of space and detected when our space had been infiltrated.

Because we may not always have an Internet connection to our smartphone when out in the field, we extended our methods of being remotely alerted to include SMS, using a few simple lines of script which connected to the API of an SMS gateway service.

Moving away from protecting our space to protecting our digital assets, we looked at a way for our Pi to know when we're in the vicinity, with a script that scanned for the Wi-Fi address of our personal phone, which if found, could then do something, such as unlocking our encrypted...