Category Archives: Espionage

Dodging the Camera: How to Beat the Surveillance State in its Own Game

Powered by advances in artificial intelligence (AI), face-recognition systems are spreading like knotweed. Facebook, a social network, uses the technology to label people in uploaded photographs. Modern smartphones can be unlocked with it… America’s Department of Homeland Security reckons face recognition will scrutinise 97% of outbound airline passengers by 2023. Networks of face-recognition cameras are part of the police state China has built in Xinjiang, in the country’s far west. And a number of British police forces have tested the technology as a tool of mass surveillance in trials designed to spot criminals on the street.  A backlash, though, is brewing.

Refuseniks can also take matters into their own hands by trying to hide their faces from the cameras or, as has happened recently during protests in Hong Kong, by pointing hand-held lasers at cctv cameras. to dazzle them. Meanwhile, a small but growing group of privacy campaigners and academics are looking at ways to subvert the underlying technology directly…

Laser Pointers Used to Blind CCTV cameras during the Hong Kong Protests 2019

In 2010… an American researcher and artist named Adam Harvey created “cv [computer vision] Dazzle”, a style of make-up designed to fool face recognisers. It uses bright colours, high contrast, graded shading and asymmetric stylings to confound an algorithm’s assumptions about what a face looks like. To a human being, the result is still clearly a face. But a computer—or, at least, the specific algorithm Mr Harvey was aiming at—is baffled….

Modern Make-Up to Hide from CCTV cameras

HyperFace is a newer project of Mr Harvey’s. Where cv Dazzle aims to alter faces, HyperFace aims to hide them among dozens of fakes. It uses blocky, semi-abstract and comparatively innocent-looking patterns that are designed to appeal as strongly as possible to face classifiers. The idea is to disguise the real thing among a sea of false positives. Clothes with the pattern, which features lines and sets of dark spots vaguely reminiscent of mouths and pairs of eyes are available…

Hyperface Clothing for Camouflage

 Even in China, says Mr Harvey, only a fraction of cctv cameras collect pictures sharp enough for face recognition to work. Low-tech approaches can help, too. “Even small things like wearing turtlenecks, wearing sunglasses, looking at your phone [and therefore not at the cameras]—together these have some protective effect”. 

Excerpts from As face-recognition technology spreads, so do ideas for subverting it: Fooling Big Brother,  Economist, Aug. 17, 2019

Who Owns Your Voice? Grabbing Biometric Data

Increasingly sophisticated technology that detects nuances in sound inaudible to humans is capturing clues about people’s likely locations, medical conditions and even physical features.Law-enforcement agencies are turning to those clues from the human voice to help sketch the faces of suspects. Banks are using them to catch scammers trying to imitate their customers on the phone, and doctors are using such data to detect the onset of dementia or depression.  That has… raised fresh privacy concerns, as consumers’ biometric data is harnessed in novel ways.

“People have known that voice carries information for centuries,” said Rita Singh, a voice and machine-learning researcher at Carnegie Mellon University who receives funding from the Department of Homeland Security…Ms. Singh measures dozens of voice-quality features—such as raspiness or tremor—that relate to the inside of a person’s vocal tract and how an individual voice is produced. She detects so-called microvolumes of air that help create the sound waves that make up the human voice. The way they resonate in the vocal tract, along with other voice characteristics, provides clues on a person’s skull structure, height, weight and physical surroundings, she said.

Nuance’s voice-biometric and recognition software is designed to detect the gender, age and linguistic background of callers and whether a voice is synthetic or recorded. It helped one bank determine that a single person was responsible for tens of millions of dollars of theft, or 18% of the fraud the firm encountered in a year, said Brett Beranek, general manager of Nuance’s security and biometrics business.

Audio data from customer-service calls is also combined with information on how consumers typically interact with mobile apps and devices, said Howard Edelstein, chairman of behavioral biometric company Biocatch. The company can detect the cadence and pressure of swipes and taps on a smartphone.  How a person holds a smartphone gives clues about their age, for example, allowing a financial firm to compare the age of the normal account user to the age of the caller…

If such data collected by a company were improperly sold or hacked, some fear recovering from identity theft could be even harder because physical features are innate and irreplaceable.

Sarah Krouse, What Your Voice Reveals About You, WSJ, Aug. 13, 2019

Nuclear Submarines on Fire (2)

Vladimir Putin has confirmed  on July 4, 2019  that the top-secret submarine that suffered a deadly fire was nuclear-powered, but Russia’s defence minister said the nuclear unit had been sealed off and was in “working order.”  The incident, which left 14 Russian sailors dead,  The Russian government has been slow to reveal information about the incident because the submersible, thought to be a deep-diving vessel used for research and reconnaissance, is among Russia’s most secret military projects.  The fire aboard the “Losharik” AS-31 submersible began in the battery compartment and spread through the vessel…The vessel is thought to be made of a series of orb-like compartments, which increase the submersible’s resilience and allow it to dive to the ocean floor. Once there, it can perform topographical research and participate in rescue missions. It may even be able to tap and sever communications cables on the seabed.

Officials claim the submariners sealed themselves in one of the compartments to battle the blaze and toxic fumes…A Norwegian official told Reuters there had been no “formal communication” from Russia about an incident aboard a nuclear-powered vessel, but “we would have been happy to have been informed of such incidents”….Accidents aboard submarines invariably evoke comparisons to Putin’s clumsy handling of the sinking of the Kursk nuclear submarine in 2000, which left 118 dead and families desperate for information about their loved ones.

Excerpt Putin confirms fire-hit Russian submarine was nuclear-powerered, Guardian, July 4, 2019

Black Operations are Getting Blacker: US Military

Heterogeneous Collaborative Unmanned Systems (HCUS), as these drones will be known, would be dropped off by either a manned submarine or one of the navy’s big new Orca robot submersibles.

Logo for Orca Submarine by Lockheed Martin

They could be delivered individually, but will more often be part of a collective system called an encapsulated payload. Such a system will then release small underwater vehicles able to identify ships and submarines by their acoustic signatures, and also aerial drones similar to the BlackWing reconnaissance drones already flown from certain naval vessels.

BlackWing

Once the initial intelligence these drones collect has been analysed, a payload’s operators will be in a position to relay further orders. They could, for example, send aerial drones ashore to drop off solar-powered ground sensors at specified points. These sensors, typically disguised as rocks, will send back the data they collect via drones of the sort that dropped them off. Some will have cameras or microphones, others seismometers which detect the vibrations of ground vehicles, while others still intercept radio traffic or Wi-Fi.

Lockheed Martin Ground Sensor Disguised as Rock

HCUS will also be capable of what are described as “limited offensive effects”. Small drones like BlackWing can be fitted with warheads powerful enough to destroy an SUV or a pickup truck. Such drones are already used to assassinate the leaders of enemy forces. They might be deployed against fuel and ammunition stores, too.

Unmanned systems such as HCUS thus promise greatly to expand the scope of submarine-based spying and special operations. Drones are cheap, expendable and can be deployed with no risk of loss of personnel. They are also “deniable”. Even when a spy drone is captured it is hard to prove where it came from. Teams of robot spies and saboteurs launched from submarines, both manned and unmanned, could thus become an important feature of the black-ops of 21st-century warfare.

Excerpts from Submarine-launched drone platoons will soon be emerging from the sea: Clandestine Warfare, Economist, June 22, 2019

If You Control Space, You Control Everything: Space as War Domain

The North Atlantic Treaty Organization (NATO) is looking to classify space as a domain for warfare in an attempt to deter China’s growing military power.  If NATO’s proposal succeeds, the international alliance could move forward with the development and use of space weapons.  According to NATO diplomats, the international organization is preparing to release an agreement that will officially declare space as a war domain. This means that aside from land, air and sea, space could also be used for military operations during times of war.

Although NATO’s partner countries currently own 65% of the satellites in space, China is reportedly preparing to launch a massive project that involves releasing constellations of satellites in low Earth orbit.  China Aerospace Science and Industry Corp (CASIC)  is planning to put in orbit 150 or more Hongyun satellites by 2023. Some of these satellites will provide commercial services like high-speed internet while others would be controlled by the Chinese military. These militarized satellites can be used to coordinate ground forces and to track approaching missiles.

“You can have warfare exclusively in space, but whoever controls space also controls what happens on land, on the sea and in the air,” according to Jamie Shea, a former NATO official. “If you don’t control space, you don’t control the other domains either.”

Excerpts from Inigo Monzon , NATO Prepares For Space Warfare By Militarizing Low Earth Orbit, International Business Times, June 24, 2019

How Companies Buy Social License: the ExxonMobil Example

The Mobil Foundation sought to use its tax-exempt grants to shape American laws and regulations on issues ranging from the climate crisis to toxic chemicals – with the explicit goal of benefiting Mobil, documents obtained by the Guardian newspaper show.  Recipients of Mobil Foundation grants included Ivy League universities, branches of the National Academies and well-known civic organizations and environmental researchers.  Benefits for Mobil included – in the foundation’s words – funding “a counterpoint to so-called ‘public interest’ groups”, helping Mobil obtain “early access” to scientific research, and offering the oil giant’s executives a forum to “challenge the US Environmental Protection Agency (EPA) behind-the-scenes”….

A third page reveals Mobil Foundation’s efforts to expand its audience inside environmental circles via a grant for the Environmental Law Institute, a half-century-old organization offering environmental law research and education to lawyers and judges.  “Institute publications are widely read in the environmental community and are helpful in communicating industry’s concerns to such organizations,” the entry says. “Mobil Foundation grants will enhance environmental organizations’ views of Mobil, enable us to reach through ELI activities many groups that we do not communicate with, and enable Mobil to participate in their dialogue groups.”

The documents also show Mobil Foundation closely examining the work of individual researchers at dozens of colleges and universities as they made their funding decisions, listing ways that foundation grants would help shape research interests to benefit Mobil, help the company recruit future employees, or help combat environmental and safety regulations that Mobil considered costly.  “It should be a wake-up call for university leaders, because what it says is that fossil fuel funding is not free,” said Geoffrey Supran, a postdoctoral researcher at Harvard and MIT.  “When you take it, you pay with your university’s social license,” Supran said. “You pay by helping facilitate these companies’ political and public relations tactics.”

In some cases, the foundation described how volunteer-staffed not-for-profits had saved Mobil money by doing work that would have otherwise been performed by Mobil’s paid staff, like cleaning birds coated in oil following a Mobil spill.  In 1987, the International Bird Rescue Research Center’s “rapid response and assistance to Mobil’s West Coast pipeline at a spill in Lebec, CA not only defused a potential public relations problem”, Mobil Foundation said, “but saved substantial costs by not requiring our department to fly cross country to respond”.d of trustees at the Woods Hole Oceanographic Institution (recipient of listed donations totalling over $200,000 from Mobil) and a part of UN efforts to study climate change.

Wise ultimately co-authored two UN Intergovernmental Panel on Climate Change reports, serving as a lead author on one. One report chapter Wise co-authored prominently recommended, among other things, burning natural gas (an ExxonMobil product) instead of coal as a way to combat climate change.

Excerpts from How Mobil pushed its oil agenda through ‘charitable giving’, Guardian, June 12, 2019

Your Typing Discloses Who You Are: Behavioral Biometrics

Behavioural biometrics make it possible to identify an individual’s “unique motion fingerprint”,… With the right software, data from a phone’s sensors can reveal details as personal as which part of someone’s foot strikes the pavement first, and how hard; the length of a walker’s stride; the number of strides per minute; and the swing and spring in the walker’s hips and step. It can also work out whether the phone in question is in a handbag, a pocket or held in a hand.

Using these variables, Unifyid, a private company, sorts gaits into about 50,000 distinct types. When coupled with information about a user’s finger pressure and speed on the touchscreen, as well as a device’s regular places of use—as revealed by its gps unit—that user’s identity can be pretty well determined, ction….Behavioural biometrics can, moreover, go beyond verifying a user’s identity. It can also detect circumstances in which it is likely that a fraud is being committed. On a device with a keyboard, for instance, a warning sign is when the typing takes on a staccato style, with a longer-than-usual finger “flight time” between keystrokes. This, according to Aleksander Kijek, head of product at Nethone, a firm in Warsaw that works out behavioural biometrics for companies that sell things online, is an indication that the device has been hijacked and is under the remote control of a computer program rather than a human typist…

Used wisely, behavioural biometrics could be a boon…Used unwisely, however, the system could become yet another electronic spy on people’s privacy, permitting complete strangers to monitor your every action, from the moment you reach for your phone in the morning, to when you fling it on the floor at night.

Excerpts from Behavioural biometrics: Online identification is getting more and more intrusive, Economist, May 23, 2019