,

How to protect yourself from surveillance state agents, algorithms

5–7 minutes
Markus V. | Red Phoenix correspondent | Pennsylvania–

The increasingly intrusive surveillance state is both insidious and pervasive. It has wormed its way into nearly every facet of our digital lives, and efforts are made to expand it further by the day. Knowledge of these systems being put into place by the fascistic United States government gives the people an edge in the fight for privacy and freedom.

The agent surveys the city square from an adjacent rooftop. Below, a gathering crowd grows in both number and fervor. The demonstration is rallying to make clear their disgust towards the most recent military strikes on a nation that refused to comply to the most recent demands the agent’s government had given it. The protest is made up of a wide assortment of people. Some, perhaps, with designs that go beyond mere chanting and banner waving.

On his tablet, a grid of camera feeds provides views from over a dozen different angles. A few small groups begin to form within the crowd. The agent chooses one in particular and expands it of the camera feeds to fill his screen. As he does, placards appear above each of the individuals. Their colors range from green to red, like a heat map. One in particular is a reddish orange, standing out amongst the other yellowish hues. The agent has found a target.

Tapping this placard expands a profile on the person it was hovering over and it fills the screen with data. Location data collected from their smart phone highlighting frequently recurring stops. Hits from facial recognition software running on cameras feeds throughout the city verifying these as well as adding more locations to the list. Known associates and political leanings gathered from social media activity, messaging contacts, and other smart phones that have been in the same area repeatedly in the past. Medical history. Criminal records. Tax records. School records. All of these things collated by a dedicated AI that ranked this individual based on the risk of political dissent they posed.

The agent marks the protester for capture and interrogation. The profile collapses back into the placard and those hovering over the other members of the group shift from yellow to a more orange color. The agent taps the screen and returns to the grid of camera feeds. He resumes his scan of the crowd, searching for more prey.

The above passage is something that is expected in the genre known as cyberpunk. Some consider these stories to be a warning of unfettered capitalism run wild; of a tyrannical cybernetic surveillance state. A glimpse into a dystopian future filled with extreme wealth and abject poverty. A world of wondrous and terrible technology, but only for those born lucky enough to own and control it. It is a world not very different from the one we find ourselves in today.

While perhaps embellished a bit for dramatic flare, this same scenario is playing out in cities across the United States under the fascist Trump regime. Data that was once collected for profit by large corporations (selling targeted advertisements along with government and personal records) are now being weaponized against the working class and oppressed peoples of the United States. Coupled with an exponentially growing web of cameras and microphones, a monstrous surveillance and paramilitary apparatus is rapidly being built. The Department of Homeland Security and other three-letter agencies have access to all of it as well as an assortment of the latest AI to sift through and pick out whomever they wish — based on criteria they deem suitable.

The technology humanity has created is amazing to behold. It gives us the ability to do things beyond our wildest dreams and enables access to the collective store of human knowledge through a device that fits in our pocket. But it has been twisted and perverted into a weapon to be used against the people, and it is imperative that we take it back. The vast majority of the public has given up any semblance of privacy in the digital world for convenience and ease of use. Much of this cannot be directly countered, but knowing their methods is half the battle.

Threat Modeling

  • Know who you are defending against based on who you are, who you are associated with, and what you’re doing. Use this information to plan accordingly.

Tracking Prevention

  • Mobile devices can be tracked a number of ways, even when powered off. The most common ways are through GPS, cell tower triangulation, and WiFi connections and probe requests.
  • Keep your device at home. If it must come with you, keep it in a Faraday bag that blocks wireless signals from entering or escaping.
  • Cover all distinguishing physical features such as hair, scars, and tattoos to avoid being identifiable by surveillance cameras. Cover your face with a mask or bandana and your eyes with mirrored safety glasses.
  • Wear nondescript clothing. Dark, dull colors. No brand logos. If possible, wear an extra layer that can be easily shed in an emergency. Organization logos should be on this second layer if worn at all.

Smart Phones, Use and Security

  • Install all system and app updates as soon as possible.
  • Disable Wi-Fi and Bluetooth whenever they are not in use.
  • Keep sensitive material off of your mobile phone whenever possible.
  • Regularly back up and delete photos and videos.
  • Use End-to-End Encrypted messengers.
  • Always be mindful of all group chat members. Start new chats with verified members on a regular basis.

EXIF (meta data)

  • Data embedded in a digital image or video containing information about it, such as camera model, camera settings (like shutter speed and ISO), as well as GPS and other location data.
  • EXIF data should be removed from image and video files before sharing to protect your privacy and prevent revealing sensitive information.

Passwords

  • 12+ Alphanumeric characters for phone lock.
  • Do not use biometrics to unlock your phone. Authorities are within their legal rights to forcibly unlock your phone with biometrics.
  • Use a password manager and a long, randomly generated password for accounts whenever possible.
  • Change passwords as often as possible to prevent unauthorized access.

Encryption

  • The setting on your device goes by various names, such as “Data Protection” or “Device Encryption” and is typically NOT enabled by default.
  • Data is only encrypted after a shutdown/reboot and before unlocking a device.
  • Encrypt directories containing sensitive data with open source applications for storage both locally and in the cloud.
  • Use PGP/GPG with asymmetric keys to encrypt sensitive communication before sending.

Like the capitalist system that set it up, the apparatus of the surveillance state is doomed to fail.






Sign up for our email newsletter:

We don’t spam! Read our privacy policy for more info.