Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Saturday, May 27, 2023

How Your De-Googled Phone Can Still Track You

When people think of privacy, especially when it comes to communications, they might think that a de-Googled phone will offer them complete privacy when they communicate with others.  De-Googling a phone is fairly simple--buy a Pixel phone, watch a few YouTube videos on the topic, install Lineage/Graphene/Calyx/etc on the phone, and you will be on your way to cell phone privacy.  Kind of.  Besides the cardinal rule of privacy--nothing you do digitally is 100% private and secure--there are several ways your phone activities can still be tracked even on a de-Googled phone...

  • The phone can be linked to you via the IMEI number if you purchase the phone online (like on Amazon) or in a store (like Best Buy) with a credit card.  When a phone is sold, the IMEI number is often attached to the sale and using a credit card allows the phone to be connected to you.
  • If you decide to do an end run around this process and go into a store and pay cash for the phone, you should probably do this at a store not in your area and give it a six months "aging period" (ie: leave it in the box and don't even turn it on for several months).  I'm not sure how long store surveillance videos are kept these days, but many a criminal is found on nearby store surveillance video buying the shovel/duct tape/tarp needed to hide their criminal activity, even if they paid cash for the items.  
  • Never connect your de-Googled phone to your home/work/school wi fi network.
  • Don't use your de-Googled phone to call friends/relatives/others who can be traced back to you.
  • Don't use/carry your de-Googled phone along side your normie phone (the phones will ping together for  period of time which is pretty much a dead giveaway when it comes to who has the de-Googled phone).
  • Never log into apps/email addresses that can be traced to you like email/Amazon/Facebook/etc.  Doing this immediately links your identity to the phone.
  • Don't use your regular sim card in your de-Googled phone.  Again, this immediately links your known identity to the phone. Pick up a burner sim for the phone.
  • Put the sim card in the phone when you need to use it then immediately remove the sim when it is no longer in use.  The sim card can be tracked through IMSI catchers to locate and eavesdrop on your phone activities.
  • Use a microphone blocker device on your cell phone.
  • Turn off the bluetooth on the phone as well as location permissions.
  • Only charge your de-Googled phone with your own charge-only USB cable to avoid juice jacking.
  • Keep your phone in a Faraday bag when not in use.
  • Use a VPN when using your de-Googled cell phone.
  • Never give your de-Googled phone number to friends or family.  Most people will add the number to their contacts and it will be vacuumed up by any social media services they use.
  • Use a secure browser and ad-blocking DNS servers.
  • Never use your de-Googled phone for 2FA.

tldr; if you want 100% digital privacy, don't use or bring digital devices (cell phone, smart watch, iPad, etc) with you.  I have no doubt that the first thing the cops did when this young lady was killed by a group of guys throwing rocks at cars, was geofence the area.  Geofencing shows all cell phones in a certain location at a certain time and since pretty much everyone--criminals included--carry their cell phones with them at all times, it was a no-brainer to determine who the rock throwers were.  Don't want a digital tracking device to track you?  Don't carry a digital tracking device.

Wednesday, March 15, 2023

100 Privacy Tips (Part 4 of 4)

Finally...

76.  Continually reinforce the need for OpSec with your family.  You don't want your spouse or kids telling their friends about the armory in the basement, the stash of gold you maintain, or the two year's worth of food you have stored for an emergency.

77.  Be aware of KYC laws and how this can impact your banking/other business activity.

78.  Don't talk to the police besides the basics of identifying yourself.

79.  Beware that if you are connected to the grid, your utility usage can make your private life habits public knowledge (and be used to prosecute you in some cases).

80.  Speaking of utilities, don't allow companies to use remote access programs to access your private data.  Examples here and here.

81.  Beware of how your activities can put your personal information on display.  This can be things like race tracking or even getting your name in the paper for something you have done.

82.  When traveling, especially internationally, take extra care with your device security.

83.  Take steps to improve the privacy of your home such as following these tips, walking around the exterior of your home both during the day and at night to ensure people can not see into your home, covering anything in the garage you don't want the neighbors to see when you open your garage door (like your gun safe or stored food), etc.

84.  Take a look at your work environment and institute as many privacy and security tips as possible (examples here, here, and here).

85.  Take privacy precautions if you will be participating in a protest.

86.  Teach your children about privacy and do your best to keep their personal data (photos, cell number...basically everything kids regularly post on social media these days) off-line.  This education also includes personal privacy topics as well.

87.  Biohacking, implant tracking, and even cyber hacking your vehicle are the "brave new world" of privacy problems.  Examples here, here, and here.  

88.  Before you have guests, the housekeeper, workmen, etc come into your home, securely store cash/jewelry/prescription meds/guns/mail/personal papers/etc. away from prying eyes.

89.  Make your car as generic looking as possible.  Keep the interior clean and bare of anything that would attract thieves or privacy snoops, and for the love of God, don't put bumper stickers on your vehicle.

90.  Similarly, before you leave your vehicle with the valet or mechanic, only give them the vehicle's valet key (not your whole keychain), and lock valuables (firearm, cash, registration info, anything with your personal info on it) in your glove box.

91.  If you want to be in for a shocker when it comes to how little digital privacy you have, download your Apple or Google data.

92.  Take steps to avoid cross-device tracking, including browser isolation, using an air-gapped computer, etc.

93.  Use physical devices to secure your cell phone and laptop including camera covers, privacy screen protectors, microphone blocker device, USB data blockers, etc.

94. Learn how to hide from drones.  More info here.

95. If you need to take extreme measures, consider using a disguise when you go out.

96. Keep up with new privacy/tech topics as this subject changes very rapidly.  On YouTube, check out The Hated One, Rob Braxman, Techlore, All Things Secured, Wolfgang's Channel, Sumsub, Shannon Morris, Naomi Brockwell, etc.

97. If money is no object, you can hire a cybersecurity team to assist you with all manner of digital security.

98. Don't want your consumer purchases used to track you?  Become a maker.

99. Brush up on privacy laws that effect you.  Examples here, here, and here.

100.  Mind what you say when speaking to people.  Many people inadvertently give away a lot of personal information when having friendly conversations with others.



Thursday, March 9, 2023

100 Privacy Tips (Part 3 of 4)

Moving right along...

51.  Clear up any legal/financial problems so you will not be encumbered by the legal/court system (also consider expunging or sealing your records if this is needed/possible).

52.  Do not rely on any government assistance programs.

53.  For even more privacy, consider renting a home which includes all utilities "off the books".

54.  Own a pre-1990's vehicle which doesn't have a "black box", On-Star, etc.

55.  Do not drive a company/commercial vehicle (examples why here and here).

56.  Be aware that the dashcam you use to protect you is also recording everything you do and say.

57.  Also be aware that when you call 911 you are being recorded (even before the 911 operator answers).

58.  Avoid CCTV/facial recognition cameras by wearing a hat, sunglasses, and mask when you are out in public (which isn't nearly as unusual post-pandemic as it was pre-pandemic). 

59.  Develop a wide skill set that would allow you to work "off the books."

60.  Go backpacking in a remote area for a couple of weeks (this may drop you totally off the grid if you do not bring any electronic devices with you).

61.  Use a notebook and pen for taking notes as digital notes can be compromised.

62.  Scrub your metadata from photos and email headers.

63.  Use non-digital home security options to safeguard your home.

64.  Learn how pre-digital surveillance societies did things (examples here, here, and here).

65.  Engineer a "normal life" and a separate "private" life.

66.  Improve your health and fitness to the point you don't need ongoing prescription medicines, ongoing medical monitoring, etc. 

67.  If you need another reason to avoid social media, realize that these services can and do share your most personal data (examples here and here).

68.  Become aware of old fashioned spy-craft skills.

69.  Learn how to avoid online scams and phishing attacks.

70.  Use items that can not be digitally tracked (old fashioned alarm clocks, "dumb" TVs, non-digital cameras, etc).

71.  Become familiar with Tor, Tails, and the Dark Web.

72.  Realize that the most mundane appliances can be used to track you (example here).

73.  Continually update your knowledge of surveillance self defense.  Also this.

74.  Learn about OSINT techniques then use these research skills on yourself so you will learn what modifications you need to make to enhance your privacy.

75.  Also, regularly Google 'how to protect my privacy' for new and updated techniques to use.

 

 


Tuesday, March 7, 2023

100 Privacy Tips (Part 2 of 4)

Continuing on...

26.  Shop thrift stores, garage sales, swap meets, etc where you pay cash for what you buy and there is no log of your transactions.

27.  Don't use store apps when shopping (don't even keep these apps on your cell phone) so your purchases won't be tracked.

28.  If you must buy online, shop directly through store websites instead of buying on Amazon.

29.  Consider concealing your voting information (this varies by state).

30.  Crosscut shred all documents with your personal information on them.

31.  Remove your personal information from people finder sites.

32.  Take your cyber security seriously (here's how).

33.  Consider using crypto for private financial transactions.

34.  Consider using your passport for definitive ID instead of you driver's license (your passport does not have your address on it like your license does).

35.  Consider being unbanked or underbanked.

36.  Consider getting a second passport.

37.  Consider getting your medical/dental/mental health care outside of the US.

38.  Learn how to barter.

39.  Live off the grid.

40.  Grow your own food.

41.  Don't have a conventional home camera security system in your home.

42.  Do not have any smart appliances in your home.

43.  Live with a simple living/minimalist/buy-it-for-life mindset.

44.  Learn about ghost guns.

45.  Have lots of non-digital entertainment options (board games, hobbies like sewing and knitting, fishing gear, etc).

46.  Do not use commercial (or any) DNA testing services.

47.  Be a gray man.

48.  Use a faraday bag when necessary.

49.  Use maps/an atlas when traveling instead of a GPS device.

50.  Be completely debt free.

Monday, March 6, 2023

100 Privacy Tips (Part 1 of 4)

Privacy is pretty much dead these days.  And not just for the rich and famous but for every single person on the planet who probably has a pile of their data sitting on a computer in a data center being parsed, packaged, and sold to whoever will buy it (advertisers most likely, but even the feds will gladly pay for data on people so they can avoid the pesky fourth amendment).  

That being said, there are still many ways to keep a bit of privacy in your life but remember none of these tips are 100% foolproof so any app/service/person who says "do this and you will have 100% privacy" is lying.  Even being out in the middle of the wilderness seemingly alone doesn't mean your activities are completely private (see also the Gabby Petito murder that was solved when someone driving by the remote murder site happened to catch the boyfriend's vehicle on their dash cam).  Here are some ways to make your everyday life a bit more private and secure:

  1. De-google a pixel phone using graphene (and never use it to log into google services).
  2. And use an anonymous SIM card in your phone. 
  3. Replace the Windows OS on your computer with Linux.
  4. Choose apps/websites/browsers with your privacy in mind.
  5. Use VPNs and/or a secure router when accessing the internet.
  6. Use an encrypted USB flash drive to store your files and/or back up your files.
  7. Own property through a trust and/or LLC (seek legal guidance for setting this up).
  8. Use an electric bike to avoid vehicle tracking technologies.
  9. Live in a remote area to avoid (most) community and residential surveillance cameras.
  10. Set up your own library of books gleaned from garage sales and thrift stores (not Amazon, not e-books).
  11. Set up your own DVD library gleaned from garage sales and thrift stores (not Amazon, not streaming services).
  12. Set up your own CD/record music library gleaned from garage sales and thrift stores (not Amazon, not Spotify).
  13. Use an over-the-air antenna instead of using cable or streaming services.
  14. Use a "dumb" TV instead of a "smart" TV.
  15. Use a regular vacuum instead of a "smart" vacuum.
  16. Never use voice assistant devices in your home.
  17. Pay cash for as many things as possible.
  18. If you must use a credit card, consider using a virtual credit card.
  19. Consider using a virtual mailbox address for privacy.
  20. And if you must use Amazon, pick up your purchases at a Hub locker instead of having home delivery.
  21. Instead of a fitness tracker, use an old fashioned pedometer.
  22. Instead of a smart watch, use an old fashioned watch.
  23. Instead of streaming radio, use an old fashioned radio.
  24. Delete social media (yes, this includes Facebook).
  25. Do not use Apple devices.   

Tuesday, January 3, 2023

Privacy in 2023

On the one hand, there really is no such thing as 100% digital privacy anymore, mostly because anything that you do digitally can be hacked by someone, or the government, or inadvertently by yourself.  A couple of interesting examples from a real-crime TV show series include the guy who told his friend he murdered someone, the friend (rightly) went to the police, then as often happens, the police had the friend call the guy up to try to get him to confess to the crime while being recorded.  The murderer told his friend that phone lines weren't secure so he should download the Signal app where they could communicate freely.  The friend downloaded the signal app and the murderer did talk freely about the murder not knowing that everything he said was being recorded by the police while the friend was using the signal app in the presence of the police.

In another case, a teenager murdered his mother.  The teen told the police his mother went to take a nap then he went to take a nap and when he woke up he found his mother dead.  Unfortunately for the teen, every single thing he did on his phone was accessible to the police.  It showed that the kid was using his phone almost the entire time, looked up how to hide a body, and when the police saw that the in-home surveillance camera system was missing, the cell phone showed a path, within inches, of the kid walking to a specific point by the lake, taking a moment, then turning around and going back to the house.  Needless to say, the surveillance system was found in the lake right where the location information on the cell phone said it would be...and it showed the kid murdering his mother.  The moral of these stories: everyone leaves a digital footprint these days that can be trapped, tracked, and if needed, used against them immediately or at a later date.

Many people think that since they aren't criminals and always follow the law, they don't need to worry about privacy but nothing could be further than the truth as covered in this video.  While total privacy is probably a foregone idea, there are many things you can do to give yourself a bit of privacy even if you don't really need it.  Consider: 

  • Pay for as many things in cash as possible.
  • Use a deGoogled phone (Rob Braxman and Side of Burritos on YouTube cover this topic thoroughly).
  • Use Linux on your laptop instead of Windows or the Apple OS.
  • Do not use unnecessary apps on your cell phone.  Period tracking apps for women in states that outlaw abortion are an obvious conflict when it comes to privacy.
  • Everything you post on social media can be found and used against you.  See any contentious person who goes viral in the media these days and you will see copies of their tweets and Facebook posts from years ago resurrected to add fuel to the proverbial firestorm they are currently experiencing.
  • Scrub metadata from pictures and emails.  One guy who was hiking the Pacific Crest Trail was pretty freaked out when fans used his social media posts and location data on pictures to find him on the trail.  While these people had no ill intent, the guy was weirded out and if, for example, someone wanted to murder him, he would have been a sitting duck without even knowing it.
  • There's literally no end to the ways that AI (artificial intelligence) will be used with your digital data in the future.  Currently it is used to make deep fake funny videos but it can also be used to make compelling, yet totally untrue, evidence against a person in a criminal trial too.
  • Additional privacy can be had by using a private email, a VPN, Brave browser, TOR browser, cryptocurrency, etc.  The caveat, however, is that technology changes so quickly that a secure service today may be hacked tomorrow and you could be screwed (see also the LastPass mess). 
  • The tldr for this topic: be careful of everything you do digitally, take reasonable precautions to make your online activities secure, change your passwords regularly, consider old fashioned entertainment options instead of being online 24/7, and check out the YouTube tech channels on the sidebar that deal with this topic.

Saturday, May 7, 2022

The Biggest Threat to Your Privacy and Safety May Be Your Cell Phone

For a while during covid, the tin-foil hat types were convinced that covid vaccines were a surreptitious way install microchips into each person on the planet in order to track them.  Who knows if this is possible/was done but I don't think it is even necessary since nearly every person in the world now has a cell phone which has basically become an appendage.  The vast majority of people wouldn't think of being more than a few feet away from their cell phones at all times so what better way to track people than via their phones?  Numerous criminals have been tracked down via their phones either by geofencing a crime scene or tracking specific phones to the point that many criminal investigations now begin and end with cell phone-related analysis.  Here are some things to consider when using your cell phones for your privacy and safety:

Monday, April 5, 2021

On Privacy...Or the Lack Thereof

I'll start with the bottom line...unless you leave behind all of your electronic devices (watch, phone, PLB, etc) and hike a good ways into the middle of nowhere, you don't have any privacy.

I could write tomes on how we got to this point--I still fondly remember heading out to the wilderness to hunt for a couple weeks at a time with absolutely no way to contact anyone unless I left a message written on a paper plate, tacked it to a tree, and hoped whoever found it passed along the message (this actually worked on several occasions BTW)--but the erosion of our individual privacy seems to have hit critical mass over the past few years.

As we, in a no doubt futile effort, attempt to thwart the latest invasions to our privacy, there are still some ways you can manage to eek a little bit of privacy into your life...

  • don't use social media and delete your social media accounts.  These days if I want to contact someone I call (insecure), email (minimally secure with ProtonMail), message (ditto with Signal), or send snail mail (not very secure but I have a few old friends who still like written letters so this is more a source of amusement than privacy).
  • I have over the air TV (not traceable), cable internet (minimally private with a VPN), no listening devices (like Alexa, Siri, etc) in my home, dumb TVs (flat screen TVs made before all TVs could connect to the internet), and my electronic devices like phones and tablets are set far enough away that they can be heard but probably can't pick up conversation.
  • pay cash as much as possible.  This has varying degrees of privacy from most (shop at small mom and pop places that don't have video surveillance) to least (big businesses that track everyone who enters their property...even more invasive when they offer "free" wifi, loyalty apps, or even more insidious, in-store key points location tracking that tracks a shopper's every movement).
  • note that while nothing you do online or on your phone is secure, burner phones can be useful (with parameters like one time use only), Linux is probably better than Windows. Graphene is probably better than Google, Brave is better than Chrome, DuckDuckGo is better than Google, and a VPN is kinda-sorta reasonably secure.  In addition modem/router security can be marginally enhanced, and computer security and privacy is an entire topic unto itself.
  • after hearing how dystopian workplaces have become **cough Amazon cough**, I'm pretty glad I am no longer working.  Working from home seems to be a better option than in an office but again, everything you do via a computer with work-related software can delve into your privacy.
  • your vehicle can be tracked in a myriad of ways.  I will note that pre-1994 vehicles don't have black boxes, but license plate readers, toll pass tracking, and with newer vehicles in-vehicle "car-tapping" does happen.  Vehicle hacking can and does happen and it is, in fact, a favorite topic at conferences like DefCon.
Another bottom line, privacy goal posts are continually moving.  Just as soon as a newer, more secure OS is released, hackers are all over it looking for ways to hack it (much to the delight of end users like the government).  Just as soon as a "private social media platform" is created, it can be deplatformed and/or hacked.  Perhaps that why searching "how to disappear from the internet" returns so many pages...

Friday, March 13, 2015

March Challenge #13 Privacy

Today's challenge is to look at your privacy and, if necessary, take steps to insure that you are protected from invasions thereof.  Here's how:

  • Remove your name from your mailbox (if you must have some sort of identification on your box, tape your name inside of it for the mailman's use only).
  • Have a locking mailbox if at all possible.
  • Put up a 'no soliciting' sign on your door and get in the habit of not answering your door unless it is to someone you know.
  • Be careful when allowing people into your home to provide services (such as the cable guy, a plumber, etc) they could be casing your home for a later burglary.
  • Remove any identifying information from your vehicle (the "my kid goes to X school" and the stick figures on the back window with each person's name on it.  This is just dumb--and too much information for anyone who may be wishing to do you harm).
  • Pull your free annual credit report and correct any incorrect information immediately.
  • Get in the habit of checking your bank and credit accounts regularly.  If you don't recognize a transaction, even something small, contact your bank immediately.
  • Get a shredder and shred any mail or other papers with your personal information on it.
  • Get in the habit of paying cash for most purchases (unless it is a big purchase and you want the added consumer protection of using a credit/bank card).
  • Don't sign up for contests and drawing that ask for your personal information.
  • Change your online passwords every three or four months.
  • Don't join social media networks (if you must, provide only very generic information).
  • Be careful of what you post on social media (ie: vacation plans are an easy invitation for burglars if they know you won't be home).
  • Password protect your phone/tablet/computer and any back-up drives.
  • Browse the web in an incognito window.  And use a VPN when using the internet over public wi fi.
  • Change the name/password for your home wi fi on a regular basis.
  • Rekey all of the locks in your home when you first move in and when anyone moves out.
  • Get on the Do Not Call list.
  • Don't fall victim to fraud and/or scams (Google can often help you figure out if the situation you are dealing with is one or the other).
  • Don't give personal information to anyone who calls you (businesses and government agencies will not call you out of the blue and ask you for personal information).
The proceeding information is only a short list of things you can do to ensure your privacy and protect yourself from scams, fraud, or worse.

Tuesday, December 14, 2010

Lessons Learned: Track Me If You Can

I was flipping through channels to provide a little background noise last night while I was working and came across a show I hadn't heard of on Discovery which I promptly Tweeted to everyone. The name of the show was 'Track Me If You Can' and it focused on ways to avoid being tracked by "big brother" or anyone else who may be looking for you. Most of the info was pretty basic but it served to provide a number of good reminders, including:
  • There are 30 million plus surveillance cameras on the US.
  • The average American is in 200 databases.
  • Putting a plan in motion to keep you from being tracked is a good idea if you are wanting to devise a new life for yourself.
  • Right before you leave, change your appearance significantly (if you have hair, shave your head, if you have blond hair, change it to black, get glasses, etc.).
  • Before you leave, terminate all of your accounts (email, bank accounts, credit cards, etc).
  • Don't terminate your social network sites as you can use these sites to provide disinformation.
  • Before you leave, delete all of your computer files and get rid of your computer's hard drive (first boil the hard drive then smash it with a hammer and finally run a Degausser/electromagnetic wand over the drive to obliterate all information it may contain).
  • Get rid of all of your personal stuff like photos, trophies, mementos, etc. that could tie you to your old life.
  • Shred all of your personal info and credit cards/bank statements/etc. then take the shredded material and spread it around in a bunch of trash bags and leave the bags at various dumpsters around the city.
  • Get rid of your cell phone as these can be easily used to track your location either through a computer software program or through triangulation.
  • Either destroy the cell phone or wipe all of your info from it then leave it at a train or bus station so that someone else will pick it up and start using it thus providing a source of disinformation for those searching for you.
  • Break your normal patterns (what you eat, where you frequent, how you shop, the kind of work you do, etc).
  • Ditch your car if possible.
  • Completely change your lifestyle (ie: if you are currently a corporate lawyer, become a night janitor then dress and behave appropriately).
  • If you do take your car get rid of the toll pass which can track your movements through the RFID chip in the pass.
  • A personal note: if you do take your car, check out 'How to Be Invisible' for ways to register your car but not have it linked directly to you.
  • Stay away from interstate highways.
  • Get rid of the GPS device which came with your car. Ditto for the OnStar system which can be activated remotely and allow others to listen in on your conversations.
  • Make sure your tires don't have RFID chips in them. Some tires do have these chips and they can link to your VIN number and the purchase location of the tires.
  • Going to non-chain restaurants is better. Of course you will be paying for everything with cash.
  • When you are out in public disguise yourself (at least wear a hat and sunglasses).
  • Avoid frequenting your usual places (in the example, if you are a vegetarian your meal preference can be found through your prior airline meal request and then you may be easier to locate if you frequent vegetarian restaurants).
  • Get your food to go from restaurants so you don't leave DNA on the plates/utensils/glasses which can be read with an easily purchased BPac machine which analyzes your biometrics.
  • Stay in small motels and pay with cash.
  • Use alcohol wipes to remove fingerprints.
  • Use a wireless bug detector to check for hidden bugs/cameras/etc.
  • Cover the peephole so people can't see into your room.
  • Sleep in your sleeping bag so you won't leave DNA behind on the hotel bedding.
  • Buy a pre-paid cell phone which you only use for outgoing calls (be sure to turn of the caller ID). Replace the pre-paid phone frequently, about every few weeks.
  • When you are not using the cell phone, remove the battery so it can't be turned on remotely or used to track you.
  • Be careful when speaking in cars or near windows. The NSA has a 'bounce laser monitoring system' which can pick up sound waves on glass and record what you are saying.
  • At night you can avoid being seen on cameras that use infrared light by fashioning a cap with LED lights on the front of it which makes a "halo" and shields your face from the cameras.
  • To determine the best place to resettle, choose a mid-sized city in a not overly cold place. Big cities and small towns are not good places for anonymity.
  • To change your identity don't just assume the identity of someone else (this is way more difficult--and illegal--than it used to be), instead petition the court to change your name legally to a new--and common--name.
  • Apply for a driver's license under your new name.
  • Most driver's licenses and passports have RFID chips in them. Block people from reading these RFID chips by carrying them in a wallet lined with aluminum foil.
  • To get back online, use a new laptop.
  • Always use a hard wire to your laptop and turn off the wi-fi which is easily hacked.
  • Put a band aid over your web cam as these can be turned on remotely.
  • Install anti-key logger software on your computer.
  • Also, install software that will reroute your ip address so your location can't be determined via your computer.
  • Be aware of the ECHELON program in the US which monitors phone and computer transmissions for keywords and messages.
  • At the grocery store, change your shopping habits and never use store club cards.
  • Be aware that some food packaging now contains RFID tags. To be sure these aren't used for tracking (unlikely now but possibly more likely in the future) repackage food once you purchase it and get rid of the store packaging.
  • To find work, get a night job as a janitor, this will limit your contact with people.
  • Change jobs often.
  • Create a "back story" for your new identity and practice it. If you base your lies on the truth but change the details a bit, your story will be easier to remember and more believable.
  • Open a bank account (preferably at a small bank that doesn't use biometrics for identification).
  • Be aware of video surveillance cameras which are everywhere.
  • Never contact people from your past.
  • The narrator noted that every year, changing your identity gets harder.
  • The police now consider common activities suspicious such as bird watching, sketching or painting, or taking photographs in public.
  • There are 70 FUSION centers in the US which coordinate surveillance and other information.
  • Airlines sometimes use locator chips on your bags so be aware of this. You can also use these tagged bags for disinformation purposes (ie: leaving them in places to throw people off your trail).
  • Technology is now available to identify you by the way you walk (change the way you walk), your facial measurements and biometrics (use a disguise, and especially sunglasses), and even your response to images.
  • It will be 7 to 10 years before your old identity drops off of old databases.
  • Guard against complacency.
  • The less you interface with technology, the better off you will be.

Overall an interesting show. I'm glad that the media sees this as being valuable information that needs to be shared with the public.

Wednesday, March 19, 2008

Pay Cash, Save Your Privacy

Well I could go off on the former Governor of New York but Letterman and Leno have covered the topic pretty well. The lesson learned from that incident, however, should not be missed--if the guy would have paid cash, he would not have earned the title of former Governor before his term was up. Here's why you need to pay for as many things as possible:

  • Using a credit card leaves a paper trail that anyone can refer back to at any time.
  • If you have more income than is stated on your W2 (we're talking lots more here) and you put it in your bank account to cover your debit card/check transactions, the IRS may wonder where the extra money is coming from.
  • Using any form of payment other than cash allows retailers to glean information about you and you can eventually find yourself being overwhelmed with advertising and marketing material reserved for their "special" customers.
  • If you only spend the cash you have, you will avoid bouncing checks, overdrawing your account, racking up credit card debt, and eventually finding yourself with a less than desirable credit score, dismal credit report, or worse, in collections or filing bankruptcy.
  • You do not need to provide additional information about yourself when you pay cash. How many times have you wrote a check or used a credit card and the salesperson needed to look at your ID as well? By writing down the information on your driver's license, the clerk will then know your age, address, and in some states, your social security number.

Tuesday, November 27, 2007

27 Tips for Phone Security

There are a number of steps you can take to add layers of security to your telephone communications:

  1. Don't use a home phone, only use a cell phone.
  2. If you do use a land line (or cell phone for that matter) have the account in the name of another person (or business).
  3. Leave the generic, computer-generated message as your outgoing message on your phone.
  4. Use a pre-paid cell phone which is not linked to your name (ie: pay for it with cash).
  5. Block your outgoing phone info so it will not show up on other's caller ID.
  6. Have caller ID on your phones and block any number that does not provide this info for incoming calls.
  7. Use a payphone for untraceable calls (make sure it is not covered by video surveillance).
  8. Use a few different cell phones from different service providers.
  9. Never link your unlinked cell phone to your name (ie: pay for it with cash, register it under an assumed name, and always pay cash for top-off cards).
  10. Use an international cell phone (and "load") purchased in a foreign country if it will work in your area.
  11. Get on the "do no call" list.
  12. Google your phone number and see how it is linked to you.
  13. Change all of your phone numbers to new, unlisted numbers.
  14. Use VOIP online phone service such as Skype.
  15. Never reveal personal information during conversations on your cell phone carried on in public areas--you never know who could be listening.
  16. Remember that all conversations/calls/texts/etc. can be monitored/recorded/tracked and behave accordingly.
  17. Purchase pre-paid calling cards for use on public and private phones. Of course, do not link them to your name by paying with a credit card or purchasing at a membership store.
  18. Consider getting a non-local area code and number for your cell (ie: a New York number if you live on the west coast). Make sure the service does not charge for roaming.
  19. Turn off your cell phone completely when it is not in use.
  20. Secure your cell by removing and hiding your SIM card when it is not in use.
  21. Learn how to tap into a land line from the street like telephone repair people can do.
  22. Have an "old fashioned" land line phone (not a cordless phone) for use if the power goes out or if you need to plug into a jack at various locations.
  23. If you must leave a personal outgoing message on your phone, have someone else record it and provide the least amount of information possible.
  24. Use a disposable phone number (http://www.numbr.com/) for certain situations.
  25. Lock your cell handset with your own (not the pre-set factory) security code.
  26. Change the pre-set message retrieval security code for both your cell and home message systems.
  27. Don't have a phone. People have lived for centuries without being tied to a telephone.

Tuesday, November 13, 2007

Computer Printer Tracking Code

Just when you thought Big Brother couldn't get any more into your business comes this article about how your printer can track your every (printed) move:


And here is an article about how you can avoid this:

Monday, October 8, 2007

24 Tips to Increase Your Privacy

Privacy used to be a carefully guarded commodity. Years ago you would ask an old-timer a question that would infringe on their privacy and all you would get was an icy stare. These days privacy is a vague theory at best--people just assume that their almost every move is being surveilled and they also assume that they can't do anything about it. For ultimate privacy you would want to move to a different state, leave no forwarding address, ditch your phones (cell and land lines), and ditch any ties to your family, friends, work, hobbies, etc. However, if you don't want to be that extreme, here are a couple dozen tips to increase your privacy a bit:

  • Take your name off of your mailbox and remove your name from the exterior of your home (this includes signs in the yard or on the front gate with your family name on it, signs on the front door with "the ___ residence" on it, etc). Leave only your house numbers visible so your home can be found in an emergency.
  • Re-key all of the locks in your home and office.
  • Get new (unpublished) home and cell phone numbers. Be sure to leave the generic greeting on these phone's answering systems instead of your personal message. Better yet, use a pre-paid disposable cell phone that is not attached to your name at all.
  • Have all of your mail sent to a PO Box or better yet, a ghost address.
  • Don't attach your name and address to anything (don't order food for delivery, don't sign up for contests/grocery store discount cards, etc.). Try to avoid filling out forms of any kind.
  • Remember that almost anything you do publicly (participate in community meetings, volunteer with various organizations, attend school, publish a document, et. al.) may end up posted online. Google yourself and see what comes up.
  • Take care with your online privacy. For example, don't order anything online, clear your browser cache/cookies and disconnect from the internet after each use, use only publicly available wi-fi networks as opposed to home or work internet connections, encrypt or use anonymous remailers for email, don't fill out any online forms, etc.
  • Make sure all of your digital documents and computer itself are password protected with a "good" password, not the name of your first child or birth date.
  • Use cash for all purchases instead of a credit or debit card.
  • Work for yourself instead of for an employer.
  • If you do work for an employer, be aware of how employee actions/work/online habits/personal information is tracked (ie: don't send personal email from a work computer, don't use the same passwords at work as you do for personal use, don't make personal phone calls from the office, etc.).
  • Make it a habit not to give out information about yourself. Practice answering generic personal questions with a non-answer and also practice steering the conversation away from yourself.
  • Consider the amount of surveillance where you live/work and choose your environment accordingly. Usually the more rural, poorer, less developed areas have much less surveillance than metropolitan areas.
  • Shred all documents that have any personal information on them as soon as your are through using them.
  • Close the blinds when it is dusk. It's amazing to drive through a neighborhood at night and see how many homes you can clearly see into simply because the people don't close their blinds!
  • Drive a non-descript car sans stickers or other identifying marks; tint the windows; and always park your vehicle in your garage.
  • Guard any document that includes your personal information (ie: show a passport instead of your driver's license if you need to show ID, refuse to allow your Social Security number to be used as an identifier such as on an insurance card or driver's license, keep personal documents in a safe when not in your immediate possession).
  • Consider having medical and dental work done in a foreign country.
  • Keep your DNA, fingerprints, retinas and any other traceable elements to yourself.
  • If you have a bank account, make sure it is used in a quite "average" way--no large deposits or withdrawals, monthly balances should roughly match what you claim on your taxes, etc.
  • Consider your options when purchasing items that are attached to your name (home, car, firearms, for example).
  • Know your rights regarding privacy issues and enforce them.
  • Don't give other people a reason to talk about you. Anything "flashy" from clothing to jewelry to your social life is fertile ground for gossip. Present yourself as if you are the most generic person on the plant.
  • Plan for what you would do in an emergency--keep in mind that 911 calls trace back to your home or cell's location, also they are recorded from the moment you call not when the dispatcher answers; consider your right to remain silent and use it; have cash on hand to use during an emergency; consider the ramifications of drawing attention to yourself (how would your life be impacted if your sound bite made the evening news should you be on scene during a major news event).

Sunday, August 12, 2007

The Digital Trail...Or How You are Are Being Tracked Day In and Day Out

Many people go about their daily business in a state of auto-pilot. Many of the things we do are routine and we do basically the same thing every day with little thought to how our every action is being recorded, digitized, analyzed and stored for future use. Although the time is still a bit off until we will all be neatly implanted with an RFID chip at birth, consider how the following tasks leave a digital trail that can easily be resurrected should the need arise:

  • You get up and deactivate your security system to let the dog out.
  • You log onto the internet.
  • You check your email.
  • You email something or receive an email.
  • You IM someone or receive and IM.
  • You pay a bill online.
  • You order from an online store.
  • You buy or sell something on EBay.
  • You send or receive photos or files online.
  • You check your financial accounts online.
  • You pass through a toll booth on your way to work.
  • You stop by Starbucks and pick up breakfast using your debit card.
  • You pass by one of the many intersections that record the license plates of red light runners.
  • You enter any number of buildings with video security (gas station, convenience store, WalMart, et al.).
  • You drive down the freeway or other road with webcam surveillance.
  • You go into your office building and swipe your ID/have your retina scanned/have your finger print scanned.
  • You log onto your server at the office.
  • You use your cellphone.
  • You eat at the company cafeteria or a local restaurant paying with anything but cash.
  • You fill out and submit a form (for anything: a loan, a passport, a medical claim, etc).
  • You drive a car that has a "black box".
  • You enter or leave the country.
  • You fly, cruise, take a train or an inter-state bus.
  • You use any type of card associated with your personal information (student ID, grocery store membership card, library card, city bus pass, etc.).
  • You write up a manifesto or any other document on your computer.
  • You have any medical or dental procedure done.
  • You enter any place (military base, courthouse, embassy) or attend an event (wedding, funeral) that records your presence.
  • You buy a firearm.
  • You rent a movie.
  • You use any service (ie: water, electricity, garbage, etc) with which your information is associated.
  • You make a call from your home phone.
  • You call 911.
  • You order a pizza or Chinese food to be delivered to your home.
  • You reactivate your security system before going to bed.

That's just a basic list of all of the ways you are tracked and your actions are recorded each day. Of course there are ways to minimize your "digital footprint" and there are some locations that are less prone to these surveillance methods than others.

Your homework: write down every way that your daily actions are being documented or leaving a digital trail for the next couple of days. After this task is completed, go through your list and brainstorm ways to minimize or eliminate this trail.

Friday, August 10, 2007

20 Ways to Protect Yourself from Identity Theft

Identity theft is huge these days. Whether from crackheads needing to fund their next fix, online scams originating from Africa or comprehensive rings with the sole purpose of divesting your from your hard earned-money and equally hard-earned credit rating, there is a good chance that you could end up a victim no matter how smart or well-educated you are. Here are a bunch of tips to keep yourself protected:
  1. Carry only one or at the most two credit cards in your wallet.
  2. Keep your other credit cards, cash and valuables locked up in a safe at your home or off-site in a safe deposit box.
  3. Reduce the number of credit cards you have. There is basically no need for 20 credit cards--this only increases the number of cards you need to keep track of.
  4. Keep a list of all of your creditors along with account numbers and company contact information. This list should be kept in a safe place as well as in a password-protected file on your computer and back-up jump drive.
  5. Shred any mail or other documents that you no longer need if they have any of your personal information on it.
  6. Have a locked mailbox or use a post office box to secure your incoming mail.
  7. Leave all of your outgoing mail in a locked mail drop box or at the post office.
  8. Review your monthly credit card and bank statements; challenge any innacuracies immediatly.
  9. Never give any personal information out (either on the phone, through email or in person) unless you have instigated the process that requires the information (ie: opened an EBay account, applied for a loan, etc).
  10. Get a copy of your free annual credit report and review it annually; challenge any discrepencies immediatly.
  11. Limit the amount of personal information available to steal (ie: don't carry your social security card, keep your passport in your immediate possession or under lock and key, don't carry bank or credit card statements around with you or leave them laying on a counter at home).
  12. If your credit card bills are late or you receive a bill in your name for an account that you know nothing about, contact the creditor immediatly.
  13. Report any instances of fraud or attempted fraud immediatly. If you see someone stealing mail or someone hacks your PayPal account, notify the authorities immediatly and file a report.
  14. After a credit transaction, take your recipt home and shred it or watch the waiter shred it, don't just leave it behind.
  15. Sign any new credit cards as soon as you receive them.
  16. Never co-sign for a loan, loan a friend your ATM card, or give anyone a blank check--those sorts of things are just asking for trouble.
  17. Put yourself on the "do not call" list and opt out of junk mail as well.
  18. Request an alternative number if your insurance company or driver's license uses this number for identification purposes.
  19. If you do apply for a new credit card or loan, make sure to follow up if you do not receive a response within an adequate amount of time.
  20. Use strong passowords for anything that requires one (ATM and credit cards, online passwords, etc).

Identity Theft Resources

Friday, July 27, 2007

Have you Googled Yourself Lately?

If you would like to start your morning off with a jolt, try typing your full name into the Google search bar. After that, type your phone number in as well (include the area code and dashes). Unless you have kept up a very high level of privacy, you may get back pages and pages of links with your information as the star of the show. I did this a couple of days ago and was surprised how many pages of results featured *me*. There were links to meetings I had attended years ago, conferences I had very minor parts in, a bio clip that I could not even remember writing and a link to another person with the same name. The electronic trail on a single, very unknown person can be surprisingly comprehensive.