Aug 20
2013

Miniature Surveillance

Miniature Surveillance is definitely on its way. The long-term trend is for devices to become more powerful, with longer lasting batteries, and multiple means of communicating data. The wars that will emerge are:

  • Government vs citizens – where the ability for regular citizens to be able to tell if they are being monitored diminishes, and government spying increases
  • Government vs criminals – secret monitoring will become illegal, but that won’t stop criminals. Just like internet criminals have become skilled at getting away with their crimes, so it will happen in the real world.
  • Government vs government – it will be the Cold War all over again…

The key to all this will be a tech battle revolving around the detectability of bugs. While they might be cheap enough to deploy en masse, they will be useless unless their data can be accessed. They might be too small to see, but airwaves can be monitored.

Anyway, here are two devices that are paving the way:

A computer that measures just one (1) cubic millimeter. In that tiny space it has squeezed:

  • a radio with integrated antennas
  • a battery
  • enough memory to run software programs as well as store data
  • two processors: 1 general purpose and 1 dedicated to power management (such as effectively using solar energy)
  • an imager (the equivalent of a 96 x96-pixel camera)
  • a solar cell
  • a temperature sensor

All the ingredients you need for spying (although you would prefer a higher-spec camera), although in this instance the device will be implanted in the eyes of glaucoma patients. More at the University of Michigan.

Mobee is a robotic insect.It weighs just 80mg, has a wingspan of 3cm, and its wings beat at 120hz.

These are the first flying devices of this size, and so far are limited by available technology:

The prototypes are still tethered by a very thin power cable because there are no off-the-shelf solutions for energy storage that are small enough to be mounted on the robot’s body. High energy-density fuel cells must be developed before the RoboBees will be able to fly with much independence.
More at Harvard, video at YouTube.

It will only be a matter of time before these little robot insects are flying under their own power, observing and communicating. Possibly swarming. In the future any open window might be a risk.

Posted in Spy Equipment | Leave a comment
May 24
2013

NSA Surveillance and You

Mental Floss have put together an excellent list of the ways the US government is known to be spying on the communications of private individuals.

The information is “based on the public statements of the former director of the National Security Agency, Justice Department attorneys, and others involved in NSA operations—as well as confidential information provided to the authors and verified independently by officials..

So take the list to mean the bare minimum. But also keep in mind that, officially:

  • “only three dozen or so people inside the NSA have the authority to read the content of FISA-derived material, all of which is now subject to a warrant”

If the government intercepted and read every communication that mention “Al Qaeda” or “bomb”, they would need many thousands of staff. So there’s no need to be too paranoid. Here’s my summary of the ways you are likely to catch the eye of the NSA:

  • you actually are a terrorist, or know one
  • if you regularly call people in Afghanistan, Pakistan, or Yemen – or email people living in countries that are terrorist havens
  • your IP address is associated with bad guys – they may have spoofed it, randomly
  • if you are a lawyer working for bad guys (!)
  • you are connected in some way with defense secrets
  • you have worked in or near a war zone
  • your premises are shared with bad guys – like the same office building

Perhaps the most interesting possibility on the list is this one:

If you are of Arab descent and attend a mosque whose imam was linked through degrees of association with Islamic charities considered to be supporters of terrorism, NSA computers probably analyzed metadata from your telephone communications and e-mail.

Just about everything else on the list is an automated process. There’s no way the NSA knows who visits a mosque unless they spy on the mosque and follow those who come and go. And then find out your phone number and email address…

I would treat mosque-goers as an example, rather than unique. If you are associated with a group that the government has any suspicions about, you could be spied on. That could be anything like anarchists, communists, gun nuts, survivalists and religious fundamentalists.

Posted in Government Surveillance | Leave a comment
May 16
2013

3D Printed Guns Have Arrived

The weapon, called “the Liberator” — a homage to cheap pistols distributed by the Allies in France during World War II — is printed on a Stratasys Dimension SST 3D printer. It consists of 16 parts, 15 of which are 3D-printed. The last part — the firing pin — is a simple nail, found in any hardware store.
[Source: Mashable]

It fired a real bullet.

The plans for the gun were available online for a short while, and by the time the Feds asked Cody Wilson to remove them, the files had spread throughout the web.

Clearly it is not a great gun. It blew apart in testing when they tried a rifle cartridge in it, and being made from plastic it won’t have the durability of metal. Also, how good are plastic bullets? At this stage we don’t know… And is it easy to aim?

As a first-of-its-kind it is pretty successful, and it is only a matter of time before high quality guns can be printed on $100 3D printers. Nails will never be made illegal, and there are many things that can be used as makeshift bullets.

I can’t see it as being a problem. People who really want guns seem to have no trouble getting them – in America anyway. And if you can’t get a gun, you can certainly get a knife, machete, crossbow or pick axe. It is unlikely that we will see an increase in crime because of this development.

Maybe they will be useful in 3rd world countries?

Cloakers should be careful not to ever download anything related to criminal activities. A CAD file for a plastic gun downloaded today could be used as evidence against you, or your integrity, in the future.

Posted in Weapons | Tagged , , , | Leave a comment
May 11
2013

Another Internet – Just For Robots

I found this over at Mega Robot News:

RoboEarth, launched last week, has been created by the European RoboEarth Project, which describes it as “a giant network and database repository where robots can share information and learn from each other about their behavior and their environment.”

… Another big aspect is the sharing of real time data, especially from sensors that will be embedded in everything. A police robot can check with local sensors to see where a criminal on the run has fled to… It’s too early to tell if they will use RoboEarth for this.

This is from the official RoboEarth web site:

But what if robots could learn from their past experiences? And what if they could share their new-found knowledge instantaneously with their peers?

These are not hypothetical questions. Rapid development of sensor and networking technology is now enabling researchers to collect vast amounts of sensor data, and new data-mining tools are being developed to extract meaningful patterns.

Sounds like spying and reporting to me. I can imagine a world where surveillance cameras have intelligence – and as soon as they spot something that seems unlawful or unwanted, they can communicate with other robotic entities to fix the problem. Robocop anyone?

Posted in Government Surveillance | Tagged | Leave a comment
Apr 15
2013

High School Students Tracked with RFID

Yet again we see tracking and surveillance technology being used because good people have nothing to hide.

One area that is set for growth is kid tracking – after all it is the responsibility of parents, guardians and pseudo-guardians (like school teachers) to always know the whereabouts of their children. So start with kids, then apply the same technology to employees, then to citizens.

A district court judge for Bexar County, Texas, has granted a temporary restraining order to prevent Northside Independent School District from removing a Hernandez from John Jay High School’s Science and Engineering Academy because she refused to wear a name badge designed to use a Radio Frequency Identification (RFID) chip to track students’ precise location on school property, the Hernandez’s attorneys announced today.

…“Regimes in the past have always started with the schools, where they develop a compliant citizenry. These ‘Student Locator’ programs are ultimately aimed at getting students used to living in a total surveillance state where there will be no privacy, and wherever you go and whatever you text or email will be watched by the government,” Whitehead warned.

[Source: CNS News]

Of course it makes sense to keep an eye on school kids. But technology should only be deployed where there is a clear benefit to a widespread problem – not just because we can.

 

Posted in Government Surveillance | Leave a comment
Mar 15
2013

NYC – Car Movements Tracked

Given that New York City is still terrified, I don’t blame them. Manhattan is the obvious target still, and so the authorities are doing their very best to keep track of who comes and goes. Huffington Post reports:

… install license plate reader cameras “in every lane of traffic on all of the bridges and tunnels that serve as entrances and exits to Manhattan.”

Soon, no one will be able to drive onto or off of the island without potentially being recorded.

Currently, Kelly said, the NYPD has “complete” coverage on the Manhattan and Brooklyn Bridges and the Battery and Holland Tunnels. License plate readers will be commissioned for additional bridges by this summer. The devices can quickly scan license plate numbers and submit the time and place they were captured to a database.

If they leave it at that, I guess the trade-off is a fair one. The Powers-That-Be will know when anyone enters or exits Manhattan, meaning your or I as well as potential terrorists. Criminals will need to keep this in mind when concocting alibis!

The concern is that this sort of monitoring will continue to expand, until ultimately your whereabouts is always known unless you use some form of cloaking.

Posted in Government Surveillance | Leave a comment
Mar 04
2013

Can You Trust VPN Services?

Virtual Private Networks (VPN) are a wonderful tool for protecting your privacy online. When you use one (and they are often very reasonably priced) the websites you visit will only see the IP address of the VPN service, and not yours at home or work.

Common uses include:

  • general privacy when researching gray area topics
  • posting comments and forum involvement
  • using the VPN’s country as a mask for your own – to perhaps open a USA iTunes account, or bypass Chinese government firewalls

Now, VPNs are only beneficial if you can trust them. Governments can easily connect your activities to a VPN service you are using – but can they get to you via the VPN company?

Ultimately you can’t trust anyone else. Ultimately the only way would be to run your own VPN. If that is beyond your capabilities, try this:

  • have a netbook that is only used for VPN activity, ever, from new. And buy it with cash
  • use free Gmail or Outlook accounts that are only ever accessed via VPN
  • only ever use your netbook/VPN combo at internet cafes or public access points like McDonalds
  • make sure there are other people accessing the web at the same time, from that same location

That’s pretty extreme. If you just wish to protect yourself at a 99% level, there are numerous VPN companies that are almost certainly trustworthy. A list of some VPN services, along with their responses to questions regarding your anonymity is over at Torrent Freak.

IMO, if the government were to acquire or start up their own VPN service, so that they could catch out those who seem to be avoiding scrutiny, there are two ways they would most likely achieve that:

1. Have a high-profile service with a lot of clients. The sort that Australian consumers would use to get access to iTunes in the USA or whatever

2. Have a service that is known and trusted by people who frequent discussion boards that focus on anonymity and black hat online practices. Hackers, basically.

So using a little known VPN that doesn’t promote themselves to hackers would be the way to go.

Posted in Internet | Leave a comment
Feb 28
2013

Future Laws Against Cloaking

Firstly, here’s a list of cloaking techniques that will most likely never be illegal:

  • normal hats
  • spectacles
  • facial hair
  • any hairstyle you choose
  • breathing masks (where the air is filthy)
  • sunglasses (when outdoors, until clear sunglasses are invented…)
  • makeup
  • scarfs
  • motorcycle and bike helmets (while you are riding)
But these can and will be against the law:
  • full face coverings (like a burqa)
  • fake facial hair
  • fake facial tattoos
  • fake noses
  • hats that obscure the eyes or side of your face
  • sunglasses indoors
  • scarves above your chin

And for transportation, you should always be able to walk, although it wouldn’t surprise me if running without a valid reason becomes illegal. Joggers might be restricted to special zones. Anything with a motor or wheels will most likely need to be registered, and have a built-in location chip. Expect that you will need to register these within the next 20 years:

  • bicycles
  • skateboards
  • scooters

With public transportation, before long everyone will have re-loadable travel cards that will require registration. Eventually face recognition systems will be used in combination with travel cards, so that there will be no way of fooling the system.

If cloaking becomes too much of a problem, expect curfews to emerge, as well as “reason to be there” zones.

Posted in Avoiding Detection | Leave a comment
Feb 25
2013

Rural and City Cloakers

I expect that when everyone knows what a cloaker is, there will be two distinct types, and one that simply doesn’t exist.

City / Downtown Cloaker: This is the most obvious cloaker. A high population density, combined with the presence of major corporations and businesses, as well as large gathering points means that inner cities will be where the most surveillance cameras will be located. The high density also means that getting quickly from A to B (by foot, scooter or bicycle) is quite easy to achieve.

Rural Cloaker: It is hard to cloak if you live in an area of low population. If you live at the end of a country road, and head into town with the licence plates of your pickup truck obscured, your neighbors will still know that it is you. And if you scoot around a small town with a mask on, you will attract attention. So if you live somewhere rural, cloaking will be more concerned with relationships with like-minded locals.

Suburban Cloaker: The worst of both worlds. Too far to get from A to B under your own steam, and too hard to network if locals. If you really want to have a life the authorities cannot connect with you, choose the city or country instead.

Posted in Avoiding Detection | Leave a comment
Feb 08
2013

UK To Spy On Personal Web Activities

UK officials plan to monitor Britons’ online activities by placing surveillance devices on the country’s telecom networks, a Parliamentary report says. The program would keep tabs on which websites were visited as well as who contacted whom. [Source: RT.com]

That will include anyone who communicates with the UK internationally… While they will mostly just note who contacted who and when (as already happens, legally, in the USA), they might also store the content as well – although there might be storage limit issues unless they are building massive facilities.

It looks like this will soon apply to all countries. Those with oppressive regimes already do it, the USA is ramping up their abilities, and now the UK as well. From here on in, expect that any online activity that can be directly linked to yourself to be monitored, analyzed and shared.

  • Your IP address (if it is fixed)
  • Your email address
  • Your phone number / SIM card
  • Your name

To avoid such prying, you need to send encrypted information via a VPN (virtual private network). Because the smartest criminals and terrorists will also be doing this, the governments will be wanting to shut this down as well. They could achieve this by:

  • Identifying VPN services and flagging any activity via their servers as potentially suspicious
  • Setting up commercial VPN services or colluding with existing VPN services

So you really need to trust the VPN you are using.

Keep in mind that government bodies do not have the time or inclination to spy on lawful activities and communications – they truly just want to catch the bad guys. But if you partake in “grey area” activities and conversations, that might include you.

Posted in Avoiding Detection, Government Surveillance | Leave a comment