The Times Australia
Google AI
The Times World News

.

After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

  • Written by Dennis B Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast
After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.

Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.

The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.

Thousands have engaged with online posts calling on women to delete their period tracking apps[1], on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are reportedly[2] bracing for an influx of women from US states.

As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.

But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.

The privacy myth

Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.

Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.

Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.

Read more: Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps[3]

Recent events have demonstrated how tenuous our privacy is. Protests in Hong Kong[4] have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify Black Lives Matter[5] protesters.

Articles appeared in Australian media outlets[6] with advice on how to avoid being surveilled. And people were directed to websites, such as the Electronic Frontier Foundation[7], dedicated to informing readers about how to avoid surveillance and personal data collection.

What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of cameras[8], drones[9], automated number plate readers (ANPR/ALPR[10]), toll payment devices[11], acoustic collectors[12] and of course any internet-connected device[13].

In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.

Data deleted, not destroyed

Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.

Law enforcement and even commercial companies have the ability to access or track certain metrics including:

  • international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card
  • international mobile equipment identity (IMEI), which is directly related to their device itself.

Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.

Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.

Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).

The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.

Adding to that, we recently saw headlines about facial recognition technology[14] being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.

Read more: Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you[15]

And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.

In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to alter their facial characteristics[16].

Then again, while these measures help in the physical world, they do little to stop online detection.

Digital stealth

Online, the use of a virtual private network (VPN[17]) and/or the onion browser, Tor[18], will help improve anonymity, including from internet service providers.

Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.

One example is CCleaner[19]. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.

There are also plenty of online applications that allow the use of temporary email addresses[20] and phone numbers, and even temporary accommodation addresses for package deliveries.

To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.

And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.

References

  1. ^ delete their period tracking apps (www.theguardian.com)
  2. ^ reportedly (www.reuters.com)
  3. ^ Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps (theconversation.com)
  4. ^ Protests in Hong Kong (www.theverge.com)
  5. ^ Black Lives Matter (theconversation.com)
  6. ^ media outlets (www.crikey.com.au)
  7. ^ Electronic Frontier Foundation (www.eff.org)
  8. ^ cameras (theconversation.com)
  9. ^ drones (theconversation.com)
  10. ^ ANPR/ALPR (theconversation.com)
  11. ^ toll payment devices (www.q-free.com)
  12. ^ acoustic collectors (www.dhs.gov)
  13. ^ device (theconversation.com)
  14. ^ facial recognition technology (theconversation.com)
  15. ^ Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you (theconversation.com)
  16. ^ alter their facial characteristics (www.wsj.com)
  17. ^ VPN (theconversation.com)
  18. ^ Tor (theconversation.com)
  19. ^ CCleaner (www.ccleaner.com)
  20. ^ temporary email addresses (theconversation.com)

Read more https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046

Times Magazine

Epson launches ELPCS01 mobile projector cart

Designed for the EB-810E[1] projector and provides easy setup for portable displays in flexible ...

Governance Models for Headless CMS in Large Organizations

Where headless CMS is adopted by large enterprises, governance is the single most crucial factor d...

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner

Narwal Freo Z10 Robotic Vacuum and Mop Cleaner  Rating: ★★★★☆ (4.4/5) Category: Premium Robot ...

Shark launches SteamSpot - the shortcut for everyday floor mess

Shark introduces the Shark SteamSpot Steam Mop, a lightweight steam mop designed to make everyda...

Game Together, Stay Together: Logitech G Reveals Gaming Couples Enjoy Higher Relationship Satisfaction

With Valentine’s Day right around the corner, many lovebirds across Australia are planning for the m...

AI threatens to eat business software – and it could change the way we work

In recent weeks, a range of large “software-as-a-service” companies, including Salesforce[1], Se...

The Times Features

Why Farrer is a key test for One Nation vs the Coalition

The Farrer by-election[1] on May 9 will be a major test for new Liberal leader Angus Taylor and ...

Leader of The Nationals Senator Matt Canavan Rockhampton press conference

Well thank you ladies and gentlemen. Thank you for coming out, this morning and thank you very muc...

Chester to elevate food security issue in Canberra

Elevating the issue of food and fibre security to a matter of national importance will be the prim...

Interior Design Ideas for Open Plan Living Spaces

Open plan living has become one of the most popular layout choices in modern homes. By removing wa...

Matt Canavan is keen on income splitting. Here’s what it would mean for couples

Newly elected Nationals leader Matt Canavan has proposed[1] allowing couples with dependent chil...

Custom Homes vs Project Homes: What’s the Difference?

When building a new home, one of the first and most important decisions you’ll make is whether to ...

Tech companies are blaming massive layoffs on AI. What’s really going on?

In the past few months, a wave of tech corporations have announced significant staff cuts and ...

Berry NSW strikes a new chord as jazz and blues take over the village

Berry NSW will come alive with live blues and jazz performances across multiple venues on Thursday...

Limited-edition gin raises funds for the Easter Bilby

A new limited-edition gin from Brisbane craft distillery BY.ARTISANS is helping support the conserva...