May 02
2014

Directional Sound

Here’s a glimpse of the future. At McDonald’s there is a TV playing. Those who are sitting on designated seats can hear whatever is on. Everyone else in the room hears nothing.

When combined with technology like Microsoft’s Kinect, inanimate objects can appear to make their own sound, either when you come within range or when you interact with it.

Your finger touches the door bell. The chime is directed at you and whoever is in the house. But not to dogs. The dogs don’t go crazy because someone is at the door.

The HyperSound System is currently being used commercially in museums and retailers to provide a spotlight of sound, where passersby can only hear the audio commentary being played when standing in the right space.
Source: The Guardian

Yes, it is real and being used already!

How will this affect Cloakers?

  • Secret communications. You know the classic situation where secret agents meet on a park bench and pretend to not be having a conversation? In the future just sitting on that park bench and making a subtle but unique gesture could trigger directional speakers to relay a message.
  • Misdirection. At an airport you hear that your boarding gate has changed. The think is, only you heard the announcement. That boarding gate is a trap.
  • Proof. Recording equipment won’t be able to prove what was communicated, unless they are situated really close to the aural recipient.
  • Beneficial. Instead of wearing headphones, the music is beamed at you.

Basically you will no longer be able to trust what you hear, and will no longer know what people nearby are hearing. Just like no two Google search results are the same these days (due to personalisation), all real world aural experiences have the potential to be unique.

Posted in Avoiding Detection | Leave a comment
Apr 23
2014

Dark Web Gets A Search Engine

As far as search engines go these days, Grams is pretty basic.
http://www.wired.com/2014/04/grams-search-engine-dark-web/

Yet it is adding to the growth of the Dark Web, and I am noting how it mimics the early days of the common web known to you and I.

The focus is narrow – drugs and weapons – but with time, as the dark web expands, Grams could end up being greatly useful.

Think about it – people who buy drugs and guns are just people, and people love to chat. Before long there will be a great social aspect to the Dark Web, perhaps one day superseding the transactional aspects.

I predict the Dark Web will be the next big thing by the end of 2014.

Posted in Dark Web | Leave a comment
Apr 08
2014

Surveillance Camoflague

Surveillance is growing, and the technology keeps improving. Anybody who operates in grey or illegal areas should start considering how to avoid detection.

Phone Tracking

On the TV and in movies, typically the culprit/hero realises they are being tracked by their cellphone, and they respond by either removing the battery, smashing it or throwing it away. If you have the right piece of kit there is a much more efficient way:

Off Pocket

Basically a sleeve that blocks phone transmissions. Think of it as the ultimate airplane mode.

Drones / Thermal Imaging

The idea here is to avoid being visually recognised from above (the bigger the hat or hood, the better) and prevent your heat being detected. That means metallic materials. The required clothing is new and expensive.

Stealth Burqa $2500 – Silver-plated fabric is hand oxidized with brush stroke camouflage pattern.

Please note that if you are out in the open you can still easily be spotted due to any movement you make.

Cameras

Beating the algorithms of facial recognition technology can be achieved without buying anything. Basically you need a wonky hair cut, and colours on your face that don’t belong there:


http://ahprojects.com/projects/cv-dazzle/

 

All the products featured in this post are designed by artist Adam Harvey.

Posted in Avoiding Detection | Leave a comment
Apr 03
2014

Stingray Update

A reader alerted me to this article, which shows that Harris Corporation has more to offer than just the Stingray:

…marketing materials come with a warning that anyone distributing them outside law enforcement agencies or telecom firms could be committing a crime punishable by up to five years in jail.

These little-known cousins of the Stingray cannot only track movements—they can also perform denial-of-service attacks on phones and intercept conversations.

…documents indicate that the Stingray can also be used with software called “FishHawk,”  which boosts the device’s capabilities by allowing authorities to eavesdrop on conversations. Other similar Harris software includes “Porpoise,” which is sold on a USB drive and is designed to be installed on a laptop and used in conjunction with transceivers—possibly including the Stingray—for surveillance of text messages.

Agencies: Federal authorities have spent more than $30 million on Stingrays and related equipment and training since 2004, according to procurement records. Purchasing agencies include the FBI, DEA, Secret Service, US Immigration and Customs Enforcement, the Internal Revenue Service, the Army, and the Navy. Cops in Arizona, Maryland, Florida, North Carolina, Texas, and California have also either purchased or considered purchasing the devices, according to public records. In one case, procurement records show cops in Miami obtained a Stingray to monitor phones at a free trade conference held in Miami in 2003.

Other devices Harris sell are variations on the Stingray theme, including Triggerfish, Gossamer, Amberjack, Kingfish, Harpoon and Hailstorm. The latter is brand new & even more powerful than Stingray, although little is known about it at this stage.

Posted in Government Surveillance | Leave a comment
Apr 02
2014

Stingray: Cell Tower Interceptor

In the USA law enforcement officials have legal means of obtaining cell phone data. But that requires time and paperwork. So much easier to just intercept the information with a piece of technological kit:

The Stingray is smaller than a suitcase, costs about $400,000, and its function is pretty straight forward. Basically, it tricks all nearby cell phone traffic into sending data to the Stingray as if it were a cell tower. It then downloads all that data to a computer program that translates it for whoever is operating the Stingray. All the traffic is then passed to the nearest cell tower, with no one the wiser. [Source: CrimeLibrary.com]

Legally or not, as was proven by The Sun newspaper in England, and Wikileaks reports, your cell phone calls can easily be monitored. So either give them no other identifiable or meaningful information; location, content, owner – or just don’t use mobile communications if you operate in illegal or grey areas.

Learn more at USA Today, who claim “at least 25 police departments own a Stingray“.

 

Posted in Government Surveillance | 1 Comment
Mar 30
2014

Total Surveillance?

George Orwell’s 1984 predicted a world of substantial surveillance. Spying on citizens is certainly growing, and if anything it is accelerating. One conclusion is that, with a touch of social massaging, we will end up completely surveilled.

Excerpts via an article reprinted at Mother Earth:

Estimates vary, but by 2020 there could be over 30 billion devices connected to the Internet. Once dumb, they will have smartened up thanks to sensors and other technologies embedded in them and, thanks to your machines, your life will quite literally have gone online.

It is easy to remove yourself from the web – just choose not to participate. The future, however, will include fixed, 24/7 monitoring that is much harder to switch off.

… The dangers aren’t theoretical. In November, the British tech blogger Doctorbeet discovered that his new LG Smart TV was snooping on him. Every time he changed the channel, his activity was logged and transmitted unencrypted to LG. Doctorbeet checked the TV’s option screen and found that the setting “collection of watching info” was turned on by default. Being a techie, he turned it off, but it didn’t matter. The information continued to flow to the company anyway. [Scary – link]

  • Will eating habits collected by smart fridges be repackaged and sold to healthcare or insurance companies as predictors of obesity or other health problems—and so a reasonable basis for determining premiums?
  • Will smart lights inform drug companies of insomniac owners?

Outside of your home, products like Apple’s iBeacon will offer improved shopping experiences, but the cost is your privacy – the more Apple knows, the better you are served!

Sooner or later, with smart devices seamlessly using sensors and Big Data provided by data aggregators, it will be possible to pick you out of a crowd and identify you in complex ways in real time. If intelligent surveillance cameras armed with facial recognition technology have access to social media profiles as well as the information stored by data aggregators, a digital dossier of your life could be called up on-demand whenever your face is recognized. Imagine the power retailers and companies will exert over your life if they not only know who you are and where you are, but what your weaknesses are—whether that’s booze, cigarettes, or the appealing mortgage rate with the sketchy small print. Are we looking at a future where the car salesman really does know what he has to do to put us in that car?

… “We see outdoor lighting as the perfect infrastructure to build a brand new network,” said Hugh Martin, CEO of Sensity Systems, a Sunnyvale, California-based company interested in making lighting smart. “We felt what you’d want to use this network for is to gather information about people and the planet.”

The answer, as always in CloakerLand, comes in two flavours:

1. Disconnect completely, and see your life become more and more difficult compared to regular folk, and appear on the radar of the powers that be – your absence makes you worthy of observance.

2. Maintain a natural Big Brother profile by generally participating. But cloak any activities that might be misconstrued by those who can lock you up. It’s the equivalent of being in the French Resistance of WW2 – regular citizen by day, dangerous rebel by night.

 

Posted in Government Surveillance | Leave a comment
Mar 14
2014

Big Brother is Very Much Here

It doesn’t matter which way the story is spun by internet businesses:

  • We didn’t know they could access our data
  • They forced us to share
  • They told us to deny it

…governments are intercepting private and personal data. They will achieve it in whichever manner they see fit:

Applebaum, a cryptography expert, was yesterday named as an author of an explosive article in Der Spiegel listing the names and details of several NSA exploits. The Germany magazine published NSA documents that boasted of the agency’s ability to use zero-day exploits to spy on communications passing through the switches and routers of the world’s largest networking vendors, Cisco, Juniper Networks and Huawei, among others.

Today, he detailed previously unreported exploits targeting the most popular lines of servers manufactured by Dell and HP, as well as smartphones of Apple and Samsung.
[Source: IT News]

Ultimately none of this matters. Rather than trying to second-guess which pieces of your data might be discovered, just presume that they all could.

Unless your data is transported via irregular and unpopular channels using the strongest cryptography, it is unlikely to be safe.

Most of the time this won’t be an issue – the NSA won’t be interested in your chit chat – so maintain an everyday social profile online. But for anything that could be flagged or misconstrued (and err on the side of caution), try using off-grid forms of communication.

 

Posted in Avoiding Detection, Government Surveillance | Leave a comment
Feb 14
2014

Blurry Surveillance Has Results Against Criminals

This is just the beginning – it is pretty rare for any technology to be restricted unless the military wants it that way. So now the future we have glimpsed in movies like Enemy of the State and TV series like Person of Interest is starting to come real.

Blurry imagery isn’t very useful on its own – but when you combine it with other sources of info and a timeline, suddenly all the pieces can fit together well enough to place a person in a situation.

Shooter and victim were just a pair of pixels, dark specks on a gray streetscape. Hair color, bullet wounds, even the weapon were not visible in the series of pictures taken from an airplane flying two miles above.

But what the images revealed — to a degree impossible just a few years ago — was location, mapped over time. Second by second, they showed a gang assembling, blocking off access points, sending the shooter to meet his target and taking flight after the body hit the pavement. When the report reached police, it included a picture of the blue stucco building into which the killer ultimately retreated, at last beyond the view of the powerful camera overhead.

…He said regular flights over the most dangerous parts of Washington — combined with publicity about how much police could see — would make a significant dent in the number of burglaries, robberies and murders. His 192-megapixel cameras would spot as many as 50 crimes per six-hour flight, he estimated, providing police with a continuous stream of images covering more than a third of the city.

Another example:

During one of the company’s demonstration flights over Dayton in 2012, police got reports of an attempted robbery at a bookstore and shots fired at a Subway sandwich shop. The cameras revealed a single car moving between the two locations.

By reviewing the images frame by frame, analysts were able to help police piece together a larger story: A man had left a residential neighborhood at midday and attempted to rob the bookstore, but fled when somebody hit an alarm. Then he drove to Subway, where the owner pulled a gun and chased him off. His next stop was a Family Dollar Store, where the man paused for several minutes. He soon returned home, after a short stop at a gas station where a video camera captured an image of his face.

A few hours later, after the surveillance flight ended, the Family Dollar Store was robbed. Police used the detailed map of the man’s movements, along with other evidence from the crime scenes, to arrest him for all three crimes.

[Source: Washington Post]

Posted in Government Surveillance | Leave a comment
Jan 28
2014

The Black Box Building

I envisage that somewhere in the world, once Big Brother truly kicks in, it will be legally possible to do this:

  • Have a large building, perhaps the size of a city block and several stories high
  • Shield the external walls and roof to the max
  • Have dozens of entrances and exits
  • Hundreds of data connections, encrypted as much as possible
  • Cash to enter, no ID or questions asked – like an internet cafe on steroids

The idea being that even though the authorities might be able to track you to a specific location, they can not connect you to the data connections of the building – because it is so large and busy.

It would be like a brothel from current days – you might be seen going in, but nobody can prove what you got up to. Except the Black Box Building has no witnesses looking over your shoulder.

The only downside – you need to inherently trust the people who run it. And anyone can be bought.

I suspect that if the idea takes off, as long as you use one of the lesser BBBs, and the authorities aren’t especially interested in you, and it has no high-profile clients – you might be OK.

But the real Cloakers will avoid digital altogether.

Posted in Avoiding Detection | Leave a comment
Jan 07
2014

Mini-Super Microphones Ready to Deploy

As if it wasn’t bad enough that spy cameras have been miniaturised…

Surveillance footage tends to be silent, because of the difficulties aiming a microphone, pinpointing where the action is, and reducing background noise. A new product not only solves all of those problems, it is also the size of a matchstick…

…a Dutch acoustics firm, Microflown Technologies, has developed a matchstick-sized sensor that can pinpoint and record a target’s conversation from a distance.

Known as an acoustic vector sensor, Microflown’s sensor measures the movement of air, disturbed by sound waves, to almost instantly locate where a sound originated. It can then identify the noise, and, if required, transmit it live to waiting ears. [New Scientist, 29 Sept 2013]

Basically, when the sensor hears something, it can zoom in on it and listen. Combine that with video cameras and software, and you have surveillance 2.0.

The range is currently 20-25 meters, so you won’t see it…

Posted in Spy Equipment | Leave a comment