The Times Australia
The Times World News

.

After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

  • Written by Dennis B Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast
After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.

Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.

The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.

Thousands have engaged with online posts calling on women to delete their period tracking apps[1], on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are reportedly[2] bracing for an influx of women from US states.

As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.

But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.

The privacy myth

Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.

Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.

Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.

Read more: Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps[3]

Recent events have demonstrated how tenuous our privacy is. Protests in Hong Kong[4] have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify Black Lives Matter[5] protesters.

Articles appeared in Australian media outlets[6] with advice on how to avoid being surveilled. And people were directed to websites, such as the Electronic Frontier Foundation[7], dedicated to informing readers about how to avoid surveillance and personal data collection.

What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of cameras[8], drones[9], automated number plate readers (ANPR/ALPR[10]), toll payment devices[11], acoustic collectors[12] and of course any internet-connected device[13].

In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.

Data deleted, not destroyed

Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.

Law enforcement and even commercial companies have the ability to access or track certain metrics including:

  • international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card
  • international mobile equipment identity (IMEI), which is directly related to their device itself.

Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.

Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.

Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).

The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.

Adding to that, we recently saw headlines about facial recognition technology[14] being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.

Read more: Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you[15]

And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.

In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to alter their facial characteristics[16].

Then again, while these measures help in the physical world, they do little to stop online detection.

Digital stealth

Online, the use of a virtual private network (VPN[17]) and/or the onion browser, Tor[18], will help improve anonymity, including from internet service providers.

Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.

One example is CCleaner[19]. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.

There are also plenty of online applications that allow the use of temporary email addresses[20] and phone numbers, and even temporary accommodation addresses for package deliveries.

To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.

And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.

References

  1. ^ delete their period tracking apps (www.theguardian.com)
  2. ^ reportedly (www.reuters.com)
  3. ^ Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps (theconversation.com)
  4. ^ Protests in Hong Kong (www.theverge.com)
  5. ^ Black Lives Matter (theconversation.com)
  6. ^ media outlets (www.crikey.com.au)
  7. ^ Electronic Frontier Foundation (www.eff.org)
  8. ^ cameras (theconversation.com)
  9. ^ drones (theconversation.com)
  10. ^ ANPR/ALPR (theconversation.com)
  11. ^ toll payment devices (www.q-free.com)
  12. ^ acoustic collectors (www.dhs.gov)
  13. ^ device (theconversation.com)
  14. ^ facial recognition technology (theconversation.com)
  15. ^ Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you (theconversation.com)
  16. ^ alter their facial characteristics (www.wsj.com)
  17. ^ VPN (theconversation.com)
  18. ^ Tor (theconversation.com)
  19. ^ CCleaner (www.ccleaner.com)
  20. ^ temporary email addresses (theconversation.com)

Read more https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046

Times Magazine

Building a Strong Online Presence with Katoomba Web Design

Katoomba web design is more than just creating a website that looks good—it’s about building an online presence that reflects your brand, engages your audience, and drives results. For local businesses in the Blue Mountains, a well-designed website a...

September Sunset Polo

International Polo Tour To Bridge Historic Sport, Life-Changing Philanthropy, and Breath-Taking Beauty On Saturday, September 6th, history will be made as the International Polo Tour (IPT), a sports leader headquartered here in South Florida...

5 Ways Microsoft Fabric Simplifies Your Data Analytics Workflow

In today's data-driven world, businesses are constantly seeking ways to streamline their data analytics processes. The sheer volume and complexity of data can be overwhelming, often leading to bottlenecks and inefficiencies. Enter the innovative da...

7 Questions to Ask Before You Sign IT Support Companies in Sydney

Choosing an IT partner can feel like buying an insurance policy you hope you never need. The right choice keeps your team productive, your data safe, and your budget predictable. The wrong choice shows up as slow tickets, surprise bills, and risky sh...

Choosing the Right Legal Aid Lawyer in Sutherland Shire: Key Considerations

Legal aid services play an essential role in ensuring access to justice for all. For people in the Sutherland Shire who may not have the financial means to pay for private legal assistance, legal aid ensures that everyone has access to representa...

Watercolor vs. Oil vs. Digital: Which Medium Fits Your Pet's Personality?

When it comes to immortalizing your pet’s unique personality in art, choosing the right medium is essential. Each artistic medium, whether watercolor, oil, or digital, has distinct qualities that can bring out the spirit of your furry friend in dif...

The Times Features

Wedding Photography Trends You Need to Know (Before You Regret Your Album)

Your wedding album should be a timeless keepsake, not something you cringe at years later. Trends may come and go, but choosing the right wedding photography approach ensures your ...

Can you say no to your doctor using an AI scribe?

Doctors’ offices were once private. But increasingly, artificial intelligence (AI) scribes (also known as digital scribes) are listening in. These tools can record and trans...

There’s a new vaccine for pneumococcal disease in Australia. Here’s what to know

The Australian government announced last week there’s a new vaccine[1] for pneumococcal disease on the National Immunisation Program for all children. This vaccine replaces pr...

What Makes a Small Group Tour of Italy So Memorable?

Traveling to Italy is on almost every bucket list. From the rolling hills of Tuscany to the sparkling canals of Venice, the country is filled with sights, flavors, and experiences ...

Latest data suggests Australia is overcoming its sugar addiction

Australia is now meeting the World Health Organization’s (WHO) guidelines[1] on sugar, which recommend keeping sugar below 10% of daily energy intake. New data[2] published ...

Do you really need a dental check-up and clean every 6 months?

Just over half of Australian adults[1] saw a dental practitioner in the past 12 months, most commonly for a check-up[2]. But have you been told you should get a check-up and c...