Feb 25
2013

Rural and City Cloakers

I expect that when everyone knows what a cloaker is, there will be two distinct types, and one that simply doesn’t exist.

City / Downtown Cloaker: This is the most obvious cloaker. A high population density, combined with the presence of major corporations and businesses, as well as large gathering points means that inner cities will be where the most surveillance cameras will be located. The high density also means that getting quickly from A to B (by foot, scooter or bicycle) is quite easy to achieve.

Rural Cloaker: It is hard to cloak if you live in an area of low population. If you live at the end of a country road, and head into town with the licence plates of your pickup truck obscured, your neighbors will still know that it is you. And if you scoot around a small town with a mask on, you will attract attention. So if you live somewhere rural, cloaking will be more concerned with relationships with like-minded locals.

Suburban Cloaker: The worst of both worlds. Too far to get from A to B under your own steam, and too hard to network if locals. If you really want to have a life the authorities cannot connect with you, choose the city or country instead.

Posted in Avoiding Detection | Leave a comment
Feb 08
2013

UK To Spy On Personal Web Activities

UK officials plan to monitor Britons’ online activities by placing surveillance devices on the country’s telecom networks, a Parliamentary report says. The program would keep tabs on which websites were visited as well as who contacted whom. [Source: RT.com]

That will include anyone who communicates with the UK internationally… While they will mostly just note who contacted who and when (as already happens, legally, in the USA), they might also store the content as well – although there might be storage limit issues unless they are building massive facilities.

It looks like this will soon apply to all countries. Those with oppressive regimes already do it, the USA is ramping up their abilities, and now the UK as well. From here on in, expect that any online activity that can be directly linked to yourself to be monitored, analyzed and shared.

  • Your IP address (if it is fixed)
  • Your email address
  • Your phone number / SIM card
  • Your name

To avoid such prying, you need to send encrypted information via a VPN (virtual private network). Because the smartest criminals and terrorists will also be doing this, the governments will be wanting to shut this down as well. They could achieve this by:

  • Identifying VPN services and flagging any activity via their servers as potentially suspicious
  • Setting up commercial VPN services or colluding with existing VPN services

So you really need to trust the VPN you are using.

Keep in mind that government bodies do not have the time or inclination to spy on lawful activities and communications – they truly just want to catch the bad guys. But if you partake in “grey area” activities and conversations, that might include you.

Posted in Avoiding Detection, Government Surveillance | Leave a comment
Nov 21
2012

FaceFirst Knows You Instantly

Police units in the USA are starting to use software developed by FaceFirst. The ability of the software has been predicted by futurists and depicted in movies and TV for quite some time – but now it is reality.

In a single second, law enforcement agents can match a suspect against millions upon millions of profiles in vast detailed databases stored on the cloud. It’s all done using facial recognition, and in Southern California it’s already occurring.

“Up to 4 million comparisons per second, per clustered server” — that’s how many matches a single computer wired to the FaceFirst system can consider in a single breath as images captured by cameras, cell phones and surveillance devices from as far as 100 feet away are fed into algorithms designed to pick out terrorists and persons of interest.

The technology is not restricted to fixed surveillance cameras – an agent can take a photo with their cell phone and receive an instant result.

The future for us revolves around two new paradigms:

1) What rights do individuals have to not have their likeness stored in a database? Presumably the same rules regarding DNA and fingerprint storage would apply…

2) To protect yourself, how can you mask your face so that you remain undetected? The law might have great difficulty with this, given the myriad ways one can mess with their facial imagery.

  • Could Elton John be arrested for wearing elaborate glasses?
  • How long can a fringe be?
  • In a polluted city is wearing a dust mask acceptable?
  • Should motorcycle riders wear helmets?
  • Can someone with 3rd degree burns wear bandages on their face?

The law could outlaw “deliberate disguising of your facial identity for the purposes of avoiding detection”, but could luck proving intent.

I predict that there will always be a legal means of defeating this. Once again, I predict a divided culture – those who are masked, and those who are not. I suggest that cloakers chose to ride both worlds, adopting one or the other where they see fit.

Posted in Avoiding Detection, Facial Recognition | Leave a comment
Sep 21
2012

Public Transport Smart Cards – Tracking Customers

I’m sure there are other examples around the world, but this post is regarding my home town of Melbourne that has replaced a healthy, functional ticketing system with a $1 billion system that uses smart card technology. It is called “Myki”

  • 2.2 million public transport users (all must use a Myki card)
  • 1.1 million Myki users have registered their cards

Registration is a smart move because you will get a SMS or email when your balance it running low. It also makes it easier to reload your card with cash online.  But buried away in the small print it says that authorities might be given access to your movements. And concession card holders have no choice, they must register.

There have been 71 police requests for customer movements in Melbourne this year. Most people acquired their Myki part way through the year, so a more accurate number going forward would be perhaps 200 requests annually.

Combined with CCTV footage, police will be able to prove your whereabouts down to the minute for all the time you spend on public transport. CCTV imagery will show that it is you using the card, and train/tram/bus logs will show where they took you and when.

It remains to be seen which criminal activities will be affected, and which civil liberties will be compromised. Of more concern, perhaps, are countries with looser privacy controls. In the USA, could 3rd parties (like private detectives) be sold this information? In Eastern Europe could citizens be spied on because of grey area activities?

Posted in Government Surveillance | Leave a comment
Aug 29
2012

Epidermal Electronic Systems – Human/Computer Interface

One day most people will gave these, with the exception of cloakers perhaps. Hopefully no democratic government will make them compulsory.

They will certainly have a nickname, and I can’t see EES taking off. How about e-tatt? Or e-sticker? Or e-patch? I like ePatch.

Called an “epidermal electronic system” (EES), it’s basically an electronic circuit mounted on your skin, designed to stretch, flex, and twist — and to take input from the movements of your body.

… functionality in a wide array of electronic components, including biometric sensors, LEDs, transistors, radio frequency capacitors, wireless antennas, and even conductive coils and solar cells for power. [Source: IO9]

As you can see in the video, it is pretty much a temporary tattoo, with electronics inside that can cope with being bent and twisted. But that’s not to say a more permanent version won’t be designed – one that can be used to identify you.

The most obvious uses are biometric, in which the ePatch monitors your body, and sends to information to your smartphone, or perhaps hospital equipment:

  • heart monitoring
  • brain activity
  • sleep patterns
  • neo-natal observations

The key advantage is being able to fit snugly and discreetly to the skin. Attach it to your throat and it could read what you are saying, even if you are only mouthing the words.

 

Posted in Identification and Personal Data | Leave a comment
Aug 07
2012

See Through Walls – Undetected

There are other surveillance technologies out there that can “see through walls”, but they all rely on transmitting something. This new idea is purely a receiver, so the subject has no way of telling you are watching them.

All it takes is for the subject to have WiFi in their home – presumably the subject needs to be within range of the WiFi. The article says that 25% of homes worldwide have WiFi, but of course in the western world it would be substantially higher.

Wi-Fi radio signals… When a radio wave reflects off a moving object, its frequency changes-a phenomenon called the Doppler effect. Their radar prototype identifies frequency changes to detect moving objects. It’s about the size of a suitcase and contains a radio receiver composed of two antennas ­and a signal-processing unit. In tests, they have used it to determine a person’s location, speed and direction-even through a 30cm thick brick wall. Because the device itself doesn’t emit any radio waves, it can’t be detected.

Posted in Spy Equipment | Leave a comment
Jul 11
2012

Laser Scanner Can Read Your Blood From 50 Metres

I’m not sure if the story has gotten a little exaggerated, but according to the Daily Mail:

The latest scanners acquired by the U.S. government will be able detect the most minute traces of molecular discrepancies in both individuals’ bloodstream and carry on luggage from 50 meters away.

Using advanced laser technology, Picosecond Programmable Laser scanners will show traces of drugs, chemicals, weapons, and even food you recently digested at the push of a button.

I presume that means the laser can reach blood close to the surface of your skin? Apart from that, the other amazing aspect is the speed at which the device can process the data:

The process of scanning and downloading the information takes only picoseconds- so one-trillionth of a second- which means that security workers would be alerted to any alarming substances as you were approaching them.

Because it takes such a short amount of time to use the laser technology and interpret the data, security officials will not have to discriminate among suspicious passengers and will have time to use the technology on everyone.

Unless some law or government promise is in place, citizens will never know where and when they are being scanned. This could certainly have ramifications for grey areas like recreational drugs – Ecstasy for example.

Solutions? Well, people would need their own detectors that could alert them to being scanned. Or if the public was sufficiently disgruntled, they could start carrying innoucuos substances that mimmick something dangerous. Too many false positives could render the scanning useless…

BTW, there is also affordable technology that can scan your fingerprints from 20 feet away!

Posted in Government Surveillance, Spy Equipment | Leave a comment
Jul 11
2012

Cell Phone Privacy

Without a warrant, a U.S. law enforcement agency can obtain the following pieces of information about your cell phone use:

  • text messages
  • voicemails
  • geolocation data
  • phone numbers you called
  • when you called

In fact, everything but a phone conversation, because that’s all that is protected by antiquated laws. Consequently government officials are taking advantage of this, with 1.3 million requests for cell phone data last year. And each request could involve hundreds of subscribers, via “cell tower dumps”.

“We’re talking about everything you can get from a cellphone carrier, except the content of the conversation,” says ACLU legislative counsel Chris Calabrese. Much of this information can be obtained without direct or substantive evidence of criminal behavior. When a law enforcement agency requests a cell tower “dump,” that is, information on who was near a specific cell tower at a given time, “it may get back hundreds or even thousands of names.” 

New legislation, if passed, will partially fix the problem. The Geolocation Privacy and Security Act bill would allow only the following without a warrant:

  • “emergency situation” involving “immediate danger of death or serious physical injury to any person”
  • “conspiratorial activities threatening the national security interest”
  • “conspiratorial activities characteristic of organized crime.”

Another bill on the horizon would not allow any exceptions, with warrants required for all cell phone data. Until then, disposable phones are your only option if you have something to hide.

Posted in Government Surveillance | Leave a comment
Jun 24
2012

Drone Laws

According to Wired magazine, there are few laws that specifically apply to private drones (yet), but plenty of existing regulations that might cover their behavior.

  • Peeping Tom laws say you can’t view a fully or partially nude person without their knowledge, so long as they have a reasonable expectation of privacy.
  • If you intrude upon the privacy of a clothed person, then they could sue you – but they’ll need to demonstrate what harm has occurred.
  • The FAA prohibits most commercial uses of drones, but this is likely to be relaxed by 2015.
  • The police should be able to use drones to replace helicopters – being operated by a pilot in the vehicle or elsewhere makes no difference. Thermal imaging and other intrusive technologies remain generally off-limits.
  • Police can follow you car, but not track your activities all day without a warrant.
Posted in Uncategorized | Leave a comment
Jun 19
2012

Map of USA Drone Bases

The US military have operated 66 bases (in 33 states) for unmanned drone aircraft within the USA itself, and has 22 more planned across the country.

This does not mean that active drones are taking off from those bases, although it will be true in many cases. Other uses include:

  • remote cockpits, where soldiers fly the unmanned craft in the Middle East
  • training facilities for prospective drone pilots
  • depots for analyzing drone data

The bases house mostly smaller spy drones like the RQ-7 Shadow, the RQ-11 Raven and the Wasp III, which has a wingspan of less than two and a half feet.

Six of the bases are home to the larger Predator and Reaper drove, which can carry missiles.

[Source: Daily Mail]

View Current and future US military drone bases in a full screen map

Posted in Government Surveillance | Leave a comment