Data hackers are watching you

Software inside your smartphone can follow you

Topics: TomDispatch, Big Brother, National security, Surveillance, NSA, IMSI, Smartphone, , ,

Data hackers are watching you
This piece originally appeared on TomDispatch.

Big Bro is watching you. Inside your mobile phone and hidden behind your web browser are little known software products marketed by contractors to the government that can follow you around anywhere. No longer the wide-eyed fantasies of conspiracy theorists, these technologies are routinely installed in all of our data devices by companies that sell them to Washington for a profit.

That’s not how they’re marketing them to us, of course. No, the message is much more seductive: Data, Silicon Valley is fond of saying, is the new oil. And the Valley’s message is clear enough: we can turn your digital information into fuel for pleasure and profits — if you just give us access to your location, your correspondence, your history, and the entertainment that you like.

Ever played Farmville? Checked into Foursquare? Listened to music on Pandora? These new social apps come with an obvious price tag: the annoying advertisements that we believe to be the fee we have to pay for our pleasure. But there’s a second, more hidden price tag — the reams of data about ourselves that we give away.  Just like raw petroleum, it can be refined into many things — the high-octane jet fuel for our social media and the asphalt and tar of our past that we would rather hide or forget.

We willingly hand over all of this information to the big data companies and in return they facilitate our communications and provide us with diversions. Take Google, which offers free email, data storage, and phone calls to many of us, or Verizon, which charges for smartphones and home phones. We can withdraw from them anytime, just as we believe that we can delete our day-to-day social activities from Facebook or Twitter.

But there is a second kind of data company of which most people are unaware: high-tech outfits that simply help themselves to our information in order to allow U.S. government agencies to dig into our past and present. Some of this is legal, since most of us have signed away the rights to our own information on digital forms that few ever bother to read, but much of it is, to put the matter politely, questionable.



This second category is made up of professional surveillance companies. They generally work for or sell their products to the government — in other words, they are paid with our tax dollars — but we have no control over them. Harris Corporation provides technology to the FBI to track, via our mobile phones, where we go; Glimmerglass builds tools that the U.S. intelligence community can use to intercept our overseas calls; and companies like James Bimen Associates design software to hack into our computers.

There is also a third category: data brokers like Arkansas-based Acxiom. These companies monitor our Google searches and sell the information to advertisers. They make it possible for Target to offer baby clothes to pregnant teenagers, but also can keep track of your reading habits and the questions you pose to Google on just about anything from pornography to terrorism, presumably to sell you Viagra and assault rifles.

Locating You

Edward Snowden has done the world a great service by telling us what the National Security Agency does and how it has sweet-talked, threatened, and bullied the first category of companies into handing over our data. As a result, perhaps you’ve considered switching providers from AT&T to T-Mobile or Dropbox to the more secure SpiderOak. After all, who wants some anonymous government bureaucrat listening in on or monitoring your online and phone life?

Missing from this debate, however, have been the companies that get contracts to break into our homes in broad daylight and steal all our information on the taxpayer’s dime. We’re talking about a multi-billion dollar industry whose tools are also available for those companies to sell to others or even use themselves for profit or vicarious pleasure.

So just what do these companies do and who are they?

The simplest form of surveillance technology is an IMSI catcher. (IMSI stands for International Mobile Subscriber Identity, which is unique to every mobile phone.) These highly portable devices pose as mini-mobile phone towers and can capture all the mobile-phone signals in an area.  In this way, they can effectively identify and locate all phone users in a particular place. Some are small enough to fit into a briefcase, others are no larger than a mobile phone. Once deployed, the IMSI catcher tricks phones into wirelessly sending it data.

By setting up several IMSI catchers in an area and measuring the speed of the responses or “pings” from a phone, an analyst can follow the movement of anyone with a mobile phone even when they are not in use.

One of the key players in this field is the Melbourne, Florida-based Harris Corporation, which has been awarded almost $7 million in public contracts by the Federal Bureau of Investigation (FBI) since 2001, mostly for radio communication equipment. For years, the company has also designed software for the agency’s National Crime Information Center to track missing persons, fugitives, criminals, and stolen property.

Harris was recently revealed to have designed an IMSI catcher for the FBI that the company named “Stingray.” Court testimony by FBI agents has confirmed the existence of the devices dating back to at least 2002.  Other companies like James Bimen Associates of Virginia have allegedly designed custom software to help the FBI hack into people’s computers, according to research by Chris Soghoian of the American Civil Liberties Union (ACLU).

The FBI has not denied this. The Bureau “hires people who have hacking skill, and they purchase tools that are capable of doing these things,” a former official in the FBI’s cyber division told the Wall Street Journal recently. “When you do, it’s because you don’t have any other choice.”

The technologies these kinds of companies exploit often rely on software vulnerabilities. Hacking software can be installed from a USB drive, or delivered remotely by disguising it as an email attachment or software update. Once in place, an analyst can rifle through a target’s files, log every keystroke, and take pictures of the screen every second. For example, SS8 of Milpitas, California, sells software called Intellego that claims to allow government agencies to “see what [the targets] see, in real time” including “draft-only emails, attached files, pictures, and videos.” Such technology can also remotely turn on phone and computer microphones, as well as computer or cellphone cameras to spy on the target in real-time.

Charting You

What the FBI does, however intrusive, is small potatoes compared to what the National Security Agency dreams of doing: getting and storing the data traffic not just of an entire nation, but of an entire planet. This became a tangible reality some two decades ago as the telecommunications industry began mass adoption of fiber-optic technology.  This means that data is no longer transmitted as electrical signals along wires that were prone to interference and static, but as light beams.

Enter companies like Glimmerglass, yet another northern California outfit. In September 2002, Glimmerglass started to sell a newly patented productconsisting of 210 tiny gold-coated mirrors mounted on microscopic hinges etched on to a single wafer of silicon.  It can help transmit data as beams of light across the undersea fiber optic cables that carry an estimated 90% of trans-border telecommunications data. The advantage of this technology is that it is dirt cheap and — for the purposes of the intelligence agencies — the light beams can easily be copied with almost no noticeable loss in quality.

“With Glimmerglass Intelligent Optical Systems (IOS), any signal travelling over fiber can be redirected in milliseconds, without adversely affecting customer traffic,” says the company on its public website.

Glimmerglass does not deny that its equipment can be used by intelligence agencies to capture global Internet traffic.  In fact, it assumes that this is probably happening.  “We believe that our 3D MEMS technology — as used by governments and various agencies — is involved in the collection of intelligence from sensors, satellites, and undersea fiber systems,” Keith May, Glimmerglass’s director of business development, told the trade magazineAviation Week in 2010. “We are deployed in several countries that are using it for lawful interception.”

In a confidential brochure, Glimmerglass has a series of graphics that, it claims, show just what its software is capable of. One displays a visual grid of the Facebook messages of a presumably fictional “John Smith.” His profile is linked to a number of other individuals (identified with images, user names, and IDs) via arrows indicating how often he connected to each of them. A second graphic shows a grid of phone calls made by a single individual that allows an operator to select and listen to audio of any of his specific conversations. Yet others display Glimmerglass software being used to monitor webmail and instant message chats.

“The challenge of managing information has become the challenge of managing the light,” says an announcer in a company video on their public website. “With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them.” This description mirrors technology described in documents provided by Edward Snowden to theGuardian newspaper.

Predicting You

Listening to phone calls, recording locations, and breaking into computers are just one part of the tool kit that the data-mining companies offer to U.S. (and other) intelligence agencies.  Think of them as the data equivalents of oil and natural gas drilling companies that are ready to extract the underground riches that have been stashed over the years in strongboxes in our basements.

What government agencies really want, however, is not just the ability to mine, but to refine those riches into the data equivalent of high-octane fuel for their investigations in very much the way we organize our own data to conduct meaningful relationships, find restaurants, or discover new music on our phones and computers.

These technologies — variously called social network analysis or semantic analysis tools — are now being packaged by the surveillance industry as ways to expose potential threats that could come from surging online communities of protesters or anti-government activists. Take Raytheon, a major U.S. military manufacturer, which makes Sidewinder air-to-air missiles, Maverick air-to-ground missiles, Patriot surface-to-air missiles, and Tomahawk submarine-launched cruise missiles. Their latest product is a software package eerily named “Riot” that claims to be able to predict where individuals are likely to go next using technology that mines data from social networks like Facebook, Foursquare, and Twitter.

Raytheon’s Rapid Information Overlay Technology software — yes, that’s how they got the acronym Riot — extracts location data from photos and comments posted online by individuals and analyzes this information.  The result is a variety of spider diagrams that purportedly will show where that individual is most likely to go next, what she likes to do, and whom she communicates with or is most likely to communicate with in the near future.

A 2010 video demonstration of the software was recently published online by the Guardian.  In it, Brian Urch of Raytheon shows how Riot can be used to track “Nick” — a company employee — in order to predict the best time and place to steal his computer or put spy software on it. “Six a.m. appears to be the most frequently visited time at the gym,” says Urch. “So if you ever did want to try to get a hold of Nick — or maybe get a hold of his laptop — you might want to visit the gym at 6:00 a.m. on Monday.”

“Riot is a big data analytics system design we are working on with industry, national labs, and commercial partners to help turn massive amounts of data into useable information to help meet our nation’s rapidly changing security needs,” Jared Adams, a spokesman for Raytheon’s intelligence and information systems department, told the Guardian.  The company denies that anyone has yet bought Riot, but U.S. government agencies certainly appear more than eager to purchase such tools.

For example, in January 2012 the FBI posted a request for an app that would allow it to “provide an automated search and scrape capability of social networks including Facebook and Twitter and [i]mmediately translate foreign language tweets into English.”  In January 2013, the U.S. Transportation Security Administration asked contractors to propose apps “to generate an assessment of the risk to the aviation transportation system that may be posed by a specific individual” using “specific sources of current, accurate, and complete non-governmental data.”

Privacy activists say that the Riot package is troubling indeed. “This sort of software allows the government to surveil everyone,” Ginger McCall, the director of the Electronic Privacy Information Center’s Open Government program, told NBC News. “It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this.”

Refining fuel from underground deposits has allowed us to travel vast distances by buses, trains, cars, and planes for pleasure and profit but at an unintentional cost: the gradual warming of our planet. Likewise, the refining of our data into social apps for pleasure, profit, and government surveillance is also coming at a cost: the gradual erosion of our privacy and ultimately our freedom of speech.

Ever tried yelling back at a security camera? You know that it is on.  You know someone is watching the footage, but it doesn’t respond to complaint, threats, or insults. Instead, it just watches you in a forbidding manner. Today, the surveillance state is so deeply enmeshed in our data devices that we don’t even scream back because technology companies have convinced us that we need to be connected to them to be happy.

With a lot of help from the surveillance industry, Big Bro has already won the fight to watch all of us all the time — unless we decide to do something about it.

Featured Slide Shows

  • Share on Twitter
  • Share on Facebook
  • 1 of 11
  • Close
  • Fullscreen
  • Thumbnails

    Ten spectacular graphic novels from 2014

    Beautiful Darkness by Fabien Vehlmann & Kerascoët
    Kerascoët's lovely, delicate pen-and-watercolor art -- all intricate botanicals, big eyes and flowing hair -- gives this fairy story a deceptively pretty finish. You find out quickly, however, that these are the heartless and heedless fairies of folk legend, not the sentimental sprites beloved by the Victorians and Disney fans. A host of tiny hominid creatures must learn to survive in the forest after fleeing their former home -- a little girl who lies dead in the woods. The main character, Aurora, tries to organize the group into a community, but most of her cohort is too capricious, lazy and selfish to participate for long. There's no real moral to this story, which is refreshing in itself, beyond the perpetual lessons that life is hard and you have to be careful whom you trust. Never has ugly truth been given a prettier face.

    Ten spectacular graphic novels from 2014

    Climate Changed: A Personal Journey Through the Science by Philippe Squarzoni
    Squarzoni is a French cartoonist who makes nonfiction graphic novels about contemporary issues and politics. While finishing up a book about France under Jacques Chirac, he realized that when it came to environmental policy, he didn't know what he was talking about. "Climate Changed" is the result of his efforts to understand what has been happening to the planet, a striking combination of memoir and data that ruminates on a notoriously elusive, difficult and even imponderable subject. Panels of talking heads dispensing information (or Squarzoni discussing the issues with his partner) are juxtaposed with detailed and meticulous yet lyrical scenes from the author's childhood, the countryside where he takes a holiday and a visit to New York. He uses his own unreachable past as a way to grasp the imminent transformation of the Earth. The result is both enlightening and unexpectedly moving.

    Ten spectacular graphic novels from 2014

    Here by Richard McGuire
    A six-page version of this innovative work by a regular contributor to the New Yorker first appeared in RAW magazine 25 years ago. Each two-page spread depicts a single place, sometimes occupied by a corner of a room, over the course of 4 billion years. The oldest image is a blur of pink and purple gases; others depict hazmat-suited explorers from 300 years in the future. Inset images show the changing decor and inhabitants of the house throughout its existence: family photos, quarrels, kids in Halloween costumes, a woman reading a book, a cat walking across the floor. The cumulative effect is serene and ravishing, an intimation of the immensity of time and the wonder embodied in the humblest things.

    Ten spectacular graphic novels from 2014

    Kill My Mother by Jules Feiffer
    The legendary Pulitzer Prize-winning cartoonist delivers his debut graphic novel at 85, a deliriously over-the-top blend of classic movie noir and melodrama that roams from chiaroscuro Bay City to Hollywood to a USO gig in the Pacific theater of World War II. There's a burnt-out drunk of a private eye, but the story is soon commandeered by a multigenerational collection of ferocious women, including a mysterious chanteuse who never speaks, a radio comedy writer who makes a childhood friend the butt of a hit series and a ruthless dame intent on making her whiny coward of a husband into a star. There are disguises, musical numbers and plenty of gunfights, but the drawing is the main attraction. Nobody convey's bodies in motion more thrillingly than Feiffer, whether they're dancing, running or duking it out. The kid has promise.

    Ten spectacular graphic novels from 2014

    The Motherless Oven by Rob Davis
    This is a weird one, but in the nervy surreal way that word-playful novels like "A Clockwork Orange" or "Ulysses" are weird. The main character, a teenage schoolboy named Scarper Lee, lives in a world where it rains knives and people make their own parents, contraptions that can be anything from a tiny figurine stashable in a pocket to biomorphic boiler-like entities that seem to have escaped from Dr. Seuss' nightmares. Their homes are crammed with gadgets they call gods and instead of TV they watch a hulu-hoop-size wheel of repeating images that changes with the day of the week. They also know their own "death day," and Scarper's is coming up fast. Maybe that's why he runs off with the new girl at school, a real troublemaker, and the obscurely dysfunctional Castro, whose mother is a cageful of talking parakeets. A solid towline of teenage angst holds this manically inventive vision together, and proves that some graphic novels can rival the text-only kind at their own game.

    Ten spectacular graphic novels from 2014

    NOBROW 9: It's Oh So Quiet
    For each issue, the anthology magazine put out by this adventurous U.K.-based publisher of independent graphic design, illustration and comics gives 45 artists a four-color palette and a theme. In the ninth issue, the theme is silence, and the results are magnificent and full of surprises. The comics, each told in images only, range from atmospheric to trippy to jokey to melancholy to epic to creepy. But the two-page illustrations are even more powerful, even if it's not always easy to see how they pertain to the overall concept of silence. Well, except perhaps for the fact that so many of them left me utterly dumbstruck with visual delight.

    Ten spectacular graphic novels from 2014

    Over Easy by Mimi Pond
    When Pond was a broke art student in the 1970s, she took a job at a neighborhood breakfast spot in Oakland, a place with good food, splendid coffee and an endlessly entertaining crew of short-order cooks, waitresses, dishwashers and regular customers. This graphic memoir, influenced by the work of Pond's friend, Alison Bechdel, captures the funky ethos of the time, when hippies, punks and disco aficionados mingled in a Bay Area at the height of its eccentricity. The staff of the Imperial Cafe were forever swapping wisecracks and hopping in and out of each other's beds, which makes them more or less like every restaurant team in history. There's an intoxicating esprit de corps to a well-run everyday joint like the Imperial Cafe, and never has the delight in being part of it been more winningly portrayed.

    Ten spectacular graphic novels from 2014

    The Shadow Hero by Gene Luen Yang and Sonny Liew
    You don't have to be a superhero fan to be utterly charmed by Yang and Liew's revival of a little-known character created in the 1940s by the cartoonist Chu Hing. This version of the Green Turtle, however, is rich in characterization, comedy and luscious period detail from the Chinatown of "San Incendio" (a ringer for San Francisco). Hank, son of a mild-mannered grocer, would like to follow in his father's footsteps, but his restless mother (the book's best character and drawn with masterful nuance by Liew) has other ideas after her thrilling encounter with a superhero. Yang's story effortlessly folds pathos into humor without stooping to either slapstick or cheap "darkness." This is that rare tribute that far surpasses the thing it celebrates.

    Ten spectacular graphic novels from 2014

    Shoplifter by Michael Cho
    Corinna Park, former English major, works, unhappily, in a Toronto advertising agency. When the dissatisfaction of the past five years begins to oppress her, she lets off steam by pilfering magazines from a local convenience store. Cho's moody character study is as much about city life as it is about Corinna. He depicts her falling asleep in front of the TV in her condo, brooding on the subway, roaming the crowded streets after a budding romance goes awry. Like a great short story, this is a simple tale of a young woman figuring out how to get her life back, but if feels as if it contains so much of contemporary existence -- its comforts, its loneliness, its self-deceptions -- suspended in wintery amber.

    Ten spectacular graphic novels from 2014

    Through the Woods by Emily Carroll
    This collection of archetypal horror, fairy and ghost stories, all about young girls, comes lushly decked in Carroll's inky black, snowy white and blood-scarlet art. A young bride hears her predecessor's bones singing from under the floorboards, two friends make the mistake of pretending to summon the spirits of the dead, a family of orphaned siblings disappears one by one into the winter nights. Carroll's color-saturated images can be jagged, ornate and gruesome, but she also knows how to chill with absence, shadows and a single staring eye. Literary readers who cherish the work of Kelly Link or the late Angela Carter's collection, "The Bloody Chamber," will adore the violent beauty on these pages.

  • Recent Slide Shows

Comments

Loading Comments...