Jul 31
2014

FBI Terrorist Screening Database Grows by 468,749 in 2013

Data revealed during a civil lawsuit shows that over 1.5 million have been added to the list over the past five yearsreports the Associated Press.

The rate of growth is accelerating:

  • 2009: ~250,000
  • 2010: ~250,000
  • 2012:  336,712
  • 2013:  468749

Clearly there aren’t that many terrorists. My guess is that, because the existing list isn’t providing the results they hoped for, they keep expanding the eligibility criteria.

We don’t know what the criteria is, but you can safely assume that if your name sounds Middle Eastern then you are in. Anyone who fits the profiles on our Terrorist Types page would probably be on it.

Posted in Identification and Personal Data | Leave a comment
Jul 19
2014

Estonia: Getting ID Cards Right?

Many people are opposed to ID cards. It seems to me that ID cards on their own are immensely useful – try to imagine international travel without passports – but the concern lies with their potential misuse.

In Estonia, a country really making the headlines, they seem to have worked out how to run an ID card system without any problems, and have been doing so for a decade now!

Some good points (read more at The Economist):

  • The electronic ID cards, which are used in health care, electronic banking and shopping, to sign contracts and encrypt e-mail, as tram tickets, even to vote.
  • Taxes take less than an hour to file, and refunds are paid within 48 hours.
  • By law, the state may not ask for any piece of information more than once
  • People have the right to know what data are held on them.
  • It uses suitably hefty encryption.
  • Two PIN codes, one for authentication (proving who the holder is) and one for authorisation (signing documents or making payments).
  • Only a minimum of private data are kept on the ID card itself.
  • Lost cards can simply be cancelled.
  • In over a decade, no security breaches have been reported.

So, you can always find out the date the government has on you. One step authentication for everyday things, two step for important things. Losing the card doesn’t matter. One card for just about everything!

Finland is looking into using the same system.

(Yes, such a card is scary, but in reality we are using proxies for it all the time. When you open a bank account, rent a car or even rent a DVD you are asked for pretty serious forms of ID. Half the websites you sign-up to ask for your DOB…)

The concern for cloakers is how far does the ID go? Are your train journeys (paid with the card) tracked? Will you one day need to swipe it every time you purchase something? Will it have an RFID chip that tracks your location?

This wouldn’t be the first time that an acceptable idea has spread roots, and then unacceptable extensions have been surreptitiously added on.

You won’t be able to have a second identity….

Posted in Identification and Personal Data | Leave a comment
Jul 16
2014

Your Credit Card Spending Is Being Monitored

This was in the Wall Street Journal a while back:

NSA also obtains access to data from Internet service providers on Internet use such as data about email or website visits, several former officials said. NSA has established similar relationships with credit-card companies, three former officials said.

And this from Businessweek:

The German magazineSpiegel, citing new details from the Edward Snowden files, reports today that an NSA program called Follow the Money tracks records of international payments, banking, and credit-card transactions.

And that is just what we have been told. TV shows and movies regularly show the authorities tracking people via their credit card usage, and it makes sense that this occurs.

So, a prudent cloaker would presume any and every credit card transaction is being watched, and wouldn’t use it for anything vaguely suspicious.

That is precisely why we need to keep cash as an option. And the governments will be looking to shut cash down…

 

Posted in Government Surveillance | Leave a comment
Jul 11
2014

NSA Spies on Linux and Tor Fans

This is why I reiterate that the privacy problem lies in the “grey area”. Squeaky clean citizens have nothing to hide. Real criminals have everything to hide. But what if you are the fan of something that is alternative, risqué and daring – but not illegal? They will watch you.

So it transpires that the NSA (and presumably other such bodies) are paying particular attention to people who use Tor. You can understand where they are coming from – Tor is used to circumvent official spying. Yes, most people using Tor are just geek enthusiasts, or cheapskate downloaders. In amongst them, perhaps 0.05% are legit gangsters – because most criminals aren’t smart enough to know how to use Tor, or to even consider it.

So a little bit of advice – when using a service that hides your activity, use one that nobody has heard of. 

The problem with the news below is that the NSA is keeping note of Linux fans. Apart from being non-standard, I can’t see why Linux users are a demographic that suggests anything illegal or immoral.

These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as “a comsec mechanism advocated by extremists on extremist forums” – and anyone looking into combining Tails with the encryption tool Truecrypt.

…Other monitored sites, we’re told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA’s servers for further analysis, and it’s up to the agency how long it keeps that data.
[Source: The Register]

What next? Go after early adopters of electric cars and Google Glass?

Posted in Government Surveillance | Leave a comment
Jul 08
2014

TSA: Unpowered Devices Not Allowed Onboard

As the traveling public knows, all electronic devices are screened by security officers. During the security examination, officers may also ask that owners power up some devices, including cell phones. Powerless devices will not be permitted onboard the aircraft. The traveler may also undergo additional screening.
TSA Press Release, July 6 2014 

At this stage these measures only apply to “certain overseas airports” with direct flights to the USA. Expect them to become more widespread. Presumably they are worried that fake phones could have weapons inside them.

In the long-term, I can imagine a world where only government sanctioned devices and software will be allowed, anywhere. If so, the first step could be to catch a “terrorist” (most that are caught in the USA have been set up by the FBI) with a weaponised phone – a hidden razor blade would suffice – and then slowly start to control such items.

Posted in Weapons | Leave a comment
Jun 25
2014

Stealth Hoodie – Convenient Face Shield

In modern-day news footage of riots we are used to seeing people wearing hoodies, dark glasses and scarves to conceal their appearance. Not the most elegant solution.

This is the new way for anyone to quickly shift from casual, ordinary streetwear to a  person who cannot be identified.

All you do is zip your hoodie all the way, past your neck and chin up to the top of your head.

Special panels allow you to still see and breathe.

This particular model is from New Mexico and available via KickStarter. $59 (plus an extra $20 for outside-USA delivery) pre-orders, shipped in September.

Posted in Avoiding Detection | Leave a comment
Jun 23
2014

Google Buys SkyBox – Armchair Spying Coming Soon!

It is rare for Google to buy an informational product that doesn’t end up free for the public to use…

(The second video is of the Burj Khalifa skyscraper in Dubai)

Google has agreed to buy satellite start-up Skybox Imaging for $US500 million in cash, the latest in a number of moves by the world’s largest internet search provider to collect and provide data from the sky.

Skybox has designed small, relatively cheap satellites that can collect daily photos and video of the Earth…
Source: The Australian

As technology improves, the eye in the sky will become more invasive.

 

Posted in Eye In The Sky | Leave a comment
Jun 19
2014

DNA Reveals Facial Features

Until now DNA has help solved crimes by matching samples found at the scene with those taken from a suspect.

In some cases DNA has been used to determine racial background and hair color.

But now a big leap has been made, with researchers combining various genes for facial parts to create a composite picture of a person.

According to New Scientistthey found 24 variants in 20 different genes that seemed to be useful predictors of facial shape“.

It isn’t perfect yet, but one day it might be. Here’s an example – the DNA-generated image and the real person:

So, going forward, don’t commit any small crime, regardless of how righteous it may be – you are increasingly likely to be caught.

Posted in Facial Recognition | Leave a comment
Jun 13
2014

The Dangers of Machine Learning

So have we worked out how to replicate human thinking? Far from it. Instead, the founding vision has taken a radically different form. AI is all around you, and its success is down to big data and statistics: making complex calculations using huge quantities of information. We have built minds, but they are not like ours.

Their reasoning is unfathomable to humans, and the implications of this development are now attracting concern. As we come to rely more and more on this new form of intelligence, we may need to change our own thinking to accommodate it.

There are two major areas of artificial intelligence.

One is rule-based, where effectively a robot/machine/computer is told exactly how to behave in each situation. They are programmed by a human, and will just about always perform as expected.

The other is machine learning, where the device learns all by itself. Although how it learns is seeded with human programming, beyond that it is on its own.

Let us say we want an AI to answer questions about a simple topic: what cats like to eat, for instance. The rule-based approach is to build, from scratch, a database about cats and their dietary habits, with logical steps.

With machine learning, you instead feed in data indiscriminately – internet searches, social media, recipe books and more. After doing things like counting the frequency of certain words and how concepts relate to one another, the system builds a statistical model that gauges the likelihood of cats enjoying certain foods.

Google Translate is a great example of machine learning. Rather than the massive task of programming translations of dozens of languages by hand, Google just looks at the entirety of the Internet and learns which words go together best.

This works great when most of what it finds online is true and accurate. Where it falls over is when information online is inaccurate, although generally speaking this is a cultural thing – the phrase “obama is the antichrist” appears more than 1 million times on the web.

The concern for cloakers is grey areas. Survivalists have been concerned that indicators somebody might be a terrorist are very similar to those for a survivalist. The US Government has told businesses that anyone buying survival equipment and paying with cash should be reported as a potential terrorist.

We are one step away from a computer determining that you are quite possibly a terrorist. But what makes this very scary is that the computer won’t be able to say why it thinks that. It will just say that, based on what it has learned, this is the conclusion it comes to.

In the early days of AI, “explainability” was prized. When a machine made a choice, a human could trace why. Yet the reasoning made by a data-driven artificial mind today is a massively complex statistical analysis of an immense number of data points. It means we have traded “why” for simply “what”.

Even if a skilled technician could follow the maths, it might not be meaningful. It would not reveal why it made a decision, because it wasn’t arrived at by a set of rules that a human can interpret.

The article I have been quoting from is Higher State of Mind, New Scientist, 10 August 2013, via The Age. It mentions how Google would show ads saying “Have you ever been arrested” if you had a name that was commonly given to a black person.

The stakes are higher now that intelligent machines are beginning to make inscrutable decisions about mortgage applications, medical diagnoses and even whether you are guilty of a crime.

 

 

Posted in Artificial Intelligence | Leave a comment
May 06
2014

Dark Wallet Makes BitCoin More Anonymous

I’m pretty impressed that one of the creators of Dark Wallet was the guy who created the first (working) gun using a 3D printer. From Wired:

 …collective of politically radical coders that calls itself unSystem plans to release the first version of Dark Wallet: a bitcoin application designed to protect its users’ identities far more strongly than the partial privacy protections bitcoin offers in its current form. If the program works as promised, it could neuter impending bitcoin regulations that seek to tie individuals’ identities to bitcoin ownership. By encrypting and mixing together its users’ payments, Dark Wallet seeks to enable practically untraceable flows of money online that add new fuel to the Web’s burgeoning black markets.

…Its central tool is a technique called CoinJoin: Every time a user spends bitcoins, his or her transaction is combined with that of another user chosen at random who’s making a payment around the same time. If, say, Alice is buying alpaca socks from an online sock seller and Bob is buying LSD on the Silk Road, Dark Wallet will combine their transactions so that the blockchain records only a single movement of funds. The bitcoins simultaneously leave Alice’s and Bob’s addresses and are paid to the sock seller and the Silk Road. The negotiation of that multi-party transaction is encrypted, so no eavesdropper on the network can easily determine whose coins went where. To mix their coins further, users can also run CoinJoin on their bitcoins when they’re not making a real payment, instead sending them to another address they own.

…Any user can ask Dark Wallet to generate a stealth address along with a secret key and then publish the stealth address online as his or her bitcoin receiving address. When another Dark Wallet user sends payment to that address, Dark Wallet is programmed to instead send the coins to another address that represents a random encryption of the stealth address. The recipient’s Dark Wallet client then scans the blockchain for any address it can decrypt with the user’s secret key, finds the stealth payment, and claims it for the user.

Slowly and surely a Dark Web is emerging, one that is so encrypted and anonymous that authorities cannot monitor or control it. Eventually it might just be left alone, a modern-day Wild West. Caveat Emptor, anyone who goes there!

UPDATE: Decent article about the creators of Dark Wallet (and where they are hiding) at Wired.

Posted in Avoiding Detection, Dark Web | Leave a comment