The Times Australia
Fisher and Paykel Appliances
The Times World News

.

After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

  • Written by Dennis B Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast
After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.

Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.

The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.

Thousands have engaged with online posts calling on women to delete their period tracking apps[1], on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are reportedly[2] bracing for an influx of women from US states.

As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.

But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.

The privacy myth

Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.

Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.

Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.

Read more: Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps[3]

Recent events have demonstrated how tenuous our privacy is. Protests in Hong Kong[4] have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify Black Lives Matter[5] protesters.

Articles appeared in Australian media outlets[6] with advice on how to avoid being surveilled. And people were directed to websites, such as the Electronic Frontier Foundation[7], dedicated to informing readers about how to avoid surveillance and personal data collection.

What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of cameras[8], drones[9], automated number plate readers (ANPR/ALPR[10]), toll payment devices[11], acoustic collectors[12] and of course any internet-connected device[13].

In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.

Data deleted, not destroyed

Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.

Law enforcement and even commercial companies have the ability to access or track certain metrics including:

  • international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card
  • international mobile equipment identity (IMEI), which is directly related to their device itself.

Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.

Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.

Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).

The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.

Adding to that, we recently saw headlines about facial recognition technology[14] being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.

Read more: Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you[15]

And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.

In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to alter their facial characteristics[16].

Then again, while these measures help in the physical world, they do little to stop online detection.

Digital stealth

Online, the use of a virtual private network (VPN[17]) and/or the onion browser, Tor[18], will help improve anonymity, including from internet service providers.

Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.

One example is CCleaner[19]. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.

There are also plenty of online applications that allow the use of temporary email addresses[20] and phone numbers, and even temporary accommodation addresses for package deliveries.

To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.

And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.

References

  1. ^ delete their period tracking apps (www.theguardian.com)
  2. ^ reportedly (www.reuters.com)
  3. ^ Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps (theconversation.com)
  4. ^ Protests in Hong Kong (www.theverge.com)
  5. ^ Black Lives Matter (theconversation.com)
  6. ^ media outlets (www.crikey.com.au)
  7. ^ Electronic Frontier Foundation (www.eff.org)
  8. ^ cameras (theconversation.com)
  9. ^ drones (theconversation.com)
  10. ^ ANPR/ALPR (theconversation.com)
  11. ^ toll payment devices (www.q-free.com)
  12. ^ acoustic collectors (www.dhs.gov)
  13. ^ device (theconversation.com)
  14. ^ facial recognition technology (theconversation.com)
  15. ^ Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you (theconversation.com)
  16. ^ alter their facial characteristics (www.wsj.com)
  17. ^ VPN (theconversation.com)
  18. ^ Tor (theconversation.com)
  19. ^ CCleaner (www.ccleaner.com)
  20. ^ temporary email addresses (theconversation.com)

Read more https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046

Times Magazine

Australia’s electric vehicle surge — EVs and hybrids hit record levels

Australians are increasingly embracing electric and hybrid cars, with 2025 shaping up as the str...

Tim Ayres on the AI rollout’s looming ‘bumps and glitches’

The federal government released its National AI Strategy[1] this week, confirming it has dropped...

Seven in Ten Australian Workers Say Employers Are Failing to Prepare Them for AI Future

As artificial intelligence (AI) accelerates across industries, a growing number of Australian work...

Mapping for Trucks: More Than Directions, It’s Optimisation

Daniel Antonello, General Manager Oceania, HERE Technologies At the end of June this year, Hampden ...

Can bigger-is-better ‘scaling laws’ keep AI improving forever? History says we can’t be too sure

OpenAI chief executive Sam Altman – perhaps the most prominent face of the artificial intellig...

A backlash against AI imagery in ads may have begun as brands promote ‘human-made’

In a wave of new ads, brands like Heineken, Polaroid and Cadbury have started hating on artifici...

The Times Features

Last-Minute Christmas Holiday Ideas for Sydney Families

Perfect escapes you can still book — without blowing the budget or travelling too far Christmas...

98 Lygon St Melbourne’s New Mediterranean Hideaway

Brunswick East has just picked up a serious summer upgrade. Neighbourhood favourite 98 Lygon St B...

How Australians can stay healthier for longer

Australians face a decade of poor health unless they close the gap between living longer and sta...

The Origin of Human Life — Is Intelligent Design Worth Taking Seriously?

For more than a century, the debate about how human life began has been framed as a binary: evol...

The way Australia produces food is unique. Our updated dietary guidelines have to recognise this

You might know Australia’s dietary guidelines[1] from the famous infographics[2] showing the typ...

Why a Holiday or Short Break in the Noosa Region Is an Ideal Getaway

Few Australian destinations capture the imagination quite like Noosa. With its calm turquoise ba...

How Dynamic Pricing in Accommodation — From Caravan Parks to Hotels — Affects Holiday Affordability

Dynamic pricing has quietly become one of the most influential forces shaping the cost of an Aus...

The rise of chatbot therapists: Why AI cannot replace human care

Some are dubbing AI as the fourth industrial revolution, with the sweeping changes it is propellin...

Australians Can Now Experience The World of Wicked Across Universal Studios Singapore and Resorts World Sentosa

This holiday season, Resorts World Sentosa (RWS), in partnership with Universal Pictures, Sentosa ...