Jul 16
2014

Your Credit Card Spending Is Being Monitored

This was in the Wall Street Journal a while back:

NSA also obtains access to data from Internet service providers on Internet use such as data about email or website visits, several former officials said. NSA has established similar relationships with credit-card companies, three former officials said.

And this from Businessweek:

The German magazineSpiegel, citing new details from the Edward Snowden files, reports today that an NSA program called Follow the Money tracks records of international payments, banking, and credit-card transactions.

And that is just what we have been told. TV shows and movies regularly show the authorities tracking people via their credit card usage, and it makes sense that this occurs.

So, a prudent cloaker would presume any and every credit card transaction is being watched, and wouldn’t use it for anything vaguely suspicious.

That is precisely why we need to keep cash as an option. And the governments will be looking to shut cash down…

 

Posted in Government Surveillance | Leave a comment
Jul 11
2014

NSA Spies on Linux and Tor Fans

This is why I reiterate that the privacy problem lies in the “grey area”. Squeaky clean citizens have nothing to hide. Real criminals have everything to hide. But what if you are the fan of something that is alternative, risqué and daring – but not illegal? They will watch you.

So it transpires that the NSA (and presumably other such bodies) are paying particular attention to people who use Tor. You can understand where they are coming from – Tor is used to circumvent official spying. Yes, most people using Tor are just geek enthusiasts, or cheapskate downloaders. In amongst them, perhaps 0.05% are legit gangsters – because most criminals aren’t smart enough to know how to use Tor, or to even consider it.

So a little bit of advice – when using a service that hides your activity, use one that nobody has heard of. 

The problem with the news below is that the NSA is keeping note of Linux fans. Apart from being non-standard, I can’t see why Linux users are a demographic that suggests anything illegal or immoral.

These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as “a comsec mechanism advocated by extremists on extremist forums” – and anyone looking into combining Tails with the encryption tool Truecrypt.

…Other monitored sites, we’re told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA’s servers for further analysis, and it’s up to the agency how long it keeps that data.
[Source: The Register]

What next? Go after early adopters of electric cars and Google Glass?

Posted in Government Surveillance | Leave a comment
Jul 08
2014

TSA: Unpowered Devices Not Allowed Onboard

As the traveling public knows, all electronic devices are screened by security officers. During the security examination, officers may also ask that owners power up some devices, including cell phones. Powerless devices will not be permitted onboard the aircraft. The traveler may also undergo additional screening.
TSA Press Release, July 6 2014 

At this stage these measures only apply to “certain overseas airports” with direct flights to the USA. Expect them to become more widespread. Presumably they are worried that fake phones could have weapons inside them.

In the long-term, I can imagine a world where only government sanctioned devices and software will be allowed, anywhere. If so, the first step could be to catch a “terrorist” (most that are caught in the USA have been set up by the FBI) with a weaponised phone – a hidden razor blade would suffice – and then slowly start to control such items.

Posted in Weapons | Leave a comment
Jun 25
2014

Stealth Hoodie – Convenient Face Shield

In modern-day news footage of riots we are used to seeing people wearing hoodies, dark glasses and scarves to conceal their appearance. Not the most elegant solution.

This is the new way for anyone to quickly shift from casual, ordinary streetwear to a  person who cannot be identified.

All you do is zip your hoodie all the way, past your neck and chin up to the top of your head.

Special panels allow you to still see and breathe.

This particular model is from New Mexico and available via KickStarter. $59 (plus an extra $20 for outside-USA delivery) pre-orders, shipped in September.

Posted in Avoiding Detection | Leave a comment
Jun 23
2014

Google Buys SkyBox – Armchair Spying Coming Soon!

It is rare for Google to buy an informational product that doesn’t end up free for the public to use…

(The second video is of the Burj Khalifa skyscraper in Dubai)

Google has agreed to buy satellite start-up Skybox Imaging for $US500 million in cash, the latest in a number of moves by the world’s largest internet search provider to collect and provide data from the sky.

Skybox has designed small, relatively cheap satellites that can collect daily photos and video of the Earth…
Source: The Australian

As technology improves, the eye in the sky will become more invasive.

 

Posted in Eye In The Sky | Leave a comment
Jun 19
2014

DNA Reveals Facial Features

Until now DNA has help solved crimes by matching samples found at the scene with those taken from a suspect.

In some cases DNA has been used to determine racial background and hair color.

But now a big leap has been made, with researchers combining various genes for facial parts to create a composite picture of a person.

According to New Scientistthey found 24 variants in 20 different genes that seemed to be useful predictors of facial shape“.

It isn’t perfect yet, but one day it might be. Here’s an example – the DNA-generated image and the real person:

So, going forward, don’t commit any small crime, regardless of how righteous it may be – you are increasingly likely to be caught.

Posted in Facial Recognition | Leave a comment
Jun 13
2014

The Dangers of Machine Learning

So have we worked out how to replicate human thinking? Far from it. Instead, the founding vision has taken a radically different form. AI is all around you, and its success is down to big data and statistics: making complex calculations using huge quantities of information. We have built minds, but they are not like ours.

Their reasoning is unfathomable to humans, and the implications of this development are now attracting concern. As we come to rely more and more on this new form of intelligence, we may need to change our own thinking to accommodate it.

There are two major areas of artificial intelligence.

One is rule-based, where effectively a robot/machine/computer is told exactly how to behave in each situation. They are programmed by a human, and will just about always perform as expected.

The other is machine learning, where the device learns all by itself. Although how it learns is seeded with human programming, beyond that it is on its own.

Let us say we want an AI to answer questions about a simple topic: what cats like to eat, for instance. The rule-based approach is to build, from scratch, a database about cats and their dietary habits, with logical steps.

With machine learning, you instead feed in data indiscriminately – internet searches, social media, recipe books and more. After doing things like counting the frequency of certain words and how concepts relate to one another, the system builds a statistical model that gauges the likelihood of cats enjoying certain foods.

Google Translate is a great example of machine learning. Rather than the massive task of programming translations of dozens of languages by hand, Google just looks at the entirety of the Internet and learns which words go together best.

This works great when most of what it finds online is true and accurate. Where it falls over is when information online is inaccurate, although generally speaking this is a cultural thing – the phrase “obama is the antichrist” appears more than 1 million times on the web.

The concern for cloakers is grey areas. Survivalists have been concerned that indicators somebody might be a terrorist are very similar to those for a survivalist. The US Government has told businesses that anyone buying survival equipment and paying with cash should be reported as a potential terrorist.

We are one step away from a computer determining that you are quite possibly a terrorist. But what makes this very scary is that the computer won’t be able to say why it thinks that. It will just say that, based on what it has learned, this is the conclusion it comes to.

In the early days of AI, “explainability” was prized. When a machine made a choice, a human could trace why. Yet the reasoning made by a data-driven artificial mind today is a massively complex statistical analysis of an immense number of data points. It means we have traded “why” for simply “what”.

Even if a skilled technician could follow the maths, it might not be meaningful. It would not reveal why it made a decision, because it wasn’t arrived at by a set of rules that a human can interpret.

The article I have been quoting from is Higher State of Mind, New Scientist, 10 August 2013, via The Age. It mentions how Google would show ads saying “Have you ever been arrested” if you had a name that was commonly given to a black person.

The stakes are higher now that intelligent machines are beginning to make inscrutable decisions about mortgage applications, medical diagnoses and even whether you are guilty of a crime.

 

 

Posted in Artificial Intelligence | Leave a comment
May 06
2014

Dark Wallet Makes BitCoin More Anonymous

I’m pretty impressed that one of the creators of Dark Wallet was the guy who created the first (working) gun using a 3D printer. From Wired:

 …collective of politically radical coders that calls itself unSystem plans to release the first version of Dark Wallet: a bitcoin application designed to protect its users’ identities far more strongly than the partial privacy protections bitcoin offers in its current form. If the program works as promised, it could neuter impending bitcoin regulations that seek to tie individuals’ identities to bitcoin ownership. By encrypting and mixing together its users’ payments, Dark Wallet seeks to enable practically untraceable flows of money online that add new fuel to the Web’s burgeoning black markets.

…Its central tool is a technique called CoinJoin: Every time a user spends bitcoins, his or her transaction is combined with that of another user chosen at random who’s making a payment around the same time. If, say, Alice is buying alpaca socks from an online sock seller and Bob is buying LSD on the Silk Road, Dark Wallet will combine their transactions so that the blockchain records only a single movement of funds. The bitcoins simultaneously leave Alice’s and Bob’s addresses and are paid to the sock seller and the Silk Road. The negotiation of that multi-party transaction is encrypted, so no eavesdropper on the network can easily determine whose coins went where. To mix their coins further, users can also run CoinJoin on their bitcoins when they’re not making a real payment, instead sending them to another address they own.

…Any user can ask Dark Wallet to generate a stealth address along with a secret key and then publish the stealth address online as his or her bitcoin receiving address. When another Dark Wallet user sends payment to that address, Dark Wallet is programmed to instead send the coins to another address that represents a random encryption of the stealth address. The recipient’s Dark Wallet client then scans the blockchain for any address it can decrypt with the user’s secret key, finds the stealth payment, and claims it for the user.

Slowly and surely a Dark Web is emerging, one that is so encrypted and anonymous that authorities cannot monitor or control it. Eventually it might just be left alone, a modern-day Wild West. Caveat Emptor, anyone who goes there!

UPDATE: Decent article about the creators of Dark Wallet (and where they are hiding) at Wired.

Posted in Avoiding Detection, Dark Web | Leave a comment
May 02
2014

Directional Sound

Here’s a glimpse of the future. At McDonald’s there is a TV playing. Those who are sitting on designated seats can hear whatever is on. Everyone else in the room hears nothing.

When combined with technology like Microsoft’s Kinect, inanimate objects can appear to make their own sound, either when you come within range or when you interact with it.

Your finger touches the door bell. The chime is directed at you and whoever is in the house. But not to dogs. The dogs don’t go crazy because someone is at the door.

The HyperSound System is currently being used commercially in museums and retailers to provide a spotlight of sound, where passersby can only hear the audio commentary being played when standing in the right space.
Source: The Guardian

Yes, it is real and being used already!

How will this affect Cloakers?

  • Secret communications. You know the classic situation where secret agents meet on a park bench and pretend to not be having a conversation? In the future just sitting on that park bench and making a subtle but unique gesture could trigger directional speakers to relay a message.
  • Misdirection. At an airport you hear that your boarding gate has changed. The think is, only you heard the announcement. That boarding gate is a trap.
  • Proof. Recording equipment won’t be able to prove what was communicated, unless they are situated really close to the aural recipient.
  • Beneficial. Instead of wearing headphones, the music is beamed at you.

Basically you will no longer be able to trust what you hear, and will no longer know what people nearby are hearing. Just like no two Google search results are the same these days (due to personalisation), all real world aural experiences have the potential to be unique.

Posted in Avoiding Detection | Leave a comment
Apr 23
2014

Dark Web Gets A Search Engine

As far as search engines go these days, Grams is pretty basic.
http://www.wired.com/2014/04/grams-search-engine-dark-web/

Yet it is adding to the growth of the Dark Web, and I am noting how it mimics the early days of the common web known to you and I.

The focus is narrow – drugs and weapons – but with time, as the dark web expands, Grams could end up being greatly useful.

Think about it – people who buy drugs and guns are just people, and people love to chat. Before long there will be a great social aspect to the Dark Web, perhaps one day superseding the transactional aspects.

I predict the Dark Web will be the next big thing by the end of 2014.

Posted in Dark Web | Leave a comment