The Times Australia
Google AI
The Times World News

.

After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

  • Written by Dennis B Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast
After Roe v Wade, here's how women could adopt 'spycraft' to avoid tracking and prosecution

The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.

Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.

The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.

Thousands have engaged with online posts calling on women to delete their period tracking apps[1], on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are reportedly[2] bracing for an influx of women from US states.

As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.

But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.

The privacy myth

Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.

Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.

Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.

Read more: Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps[3]

Recent events have demonstrated how tenuous our privacy is. Protests in Hong Kong[4] have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify Black Lives Matter[5] protesters.

Articles appeared in Australian media outlets[6] with advice on how to avoid being surveilled. And people were directed to websites, such as the Electronic Frontier Foundation[7], dedicated to informing readers about how to avoid surveillance and personal data collection.

What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of cameras[8], drones[9], automated number plate readers (ANPR/ALPR[10]), toll payment devices[11], acoustic collectors[12] and of course any internet-connected device[13].

In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.

Data deleted, not destroyed

Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.

Law enforcement and even commercial companies have the ability to access or track certain metrics including:

  • international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card
  • international mobile equipment identity (IMEI), which is directly related to their device itself.

Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.

Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.

Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).

The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.

Adding to that, we recently saw headlines about facial recognition technology[14] being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.

Read more: Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you[15]

And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.

In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to alter their facial characteristics[16].

Then again, while these measures help in the physical world, they do little to stop online detection.

Digital stealth

Online, the use of a virtual private network (VPN[17]) and/or the onion browser, Tor[18], will help improve anonymity, including from internet service providers.

Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.

One example is CCleaner[19]. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.

There are also plenty of online applications that allow the use of temporary email addresses[20] and phone numbers, and even temporary accommodation addresses for package deliveries.

To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.

And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.

References

  1. ^ delete their period tracking apps (www.theguardian.com)
  2. ^ reportedly (www.reuters.com)
  3. ^ Post Roe, women in America are right to be concerned about digital surveillance – and it’s not just period-tracking apps (theconversation.com)
  4. ^ Protests in Hong Kong (www.theverge.com)
  5. ^ Black Lives Matter (theconversation.com)
  6. ^ media outlets (www.crikey.com.au)
  7. ^ Electronic Frontier Foundation (www.eff.org)
  8. ^ cameras (theconversation.com)
  9. ^ drones (theconversation.com)
  10. ^ ANPR/ALPR (theconversation.com)
  11. ^ toll payment devices (www.q-free.com)
  12. ^ acoustic collectors (www.dhs.gov)
  13. ^ device (theconversation.com)
  14. ^ facial recognition technology (theconversation.com)
  15. ^ Bunnings, Kmart and The Good Guys say they use facial recognition for 'loss prevention'. An expert explains what it might mean for you (theconversation.com)
  16. ^ alter their facial characteristics (www.wsj.com)
  17. ^ VPN (theconversation.com)
  18. ^ Tor (theconversation.com)
  19. ^ CCleaner (www.ccleaner.com)
  20. ^ temporary email addresses (theconversation.com)

Read more https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046

Times Magazine

Epson launches ELPCS01 mobile projector cart

Designed for the EB-810E[1] projector and provides easy setup for portable displays in flexible ...

Governance Models for Headless CMS in Large Organizations

Where headless CMS is adopted by large enterprises, governance is the single most crucial factor d...

Narwal Freo Z Ultra Robotic Vacuum and Mop Cleaner

Rating: ★★★★☆ (4.4/5)Category: Premium Robot Vacuum & Mop ComboBest for: Busy households, ha...

Shark launches SteamSpot - the shortcut for everyday floor mess

Shark introduces the Shark SteamSpot Steam Mop, a lightweight steam mop designed to make everyda...

Game Together, Stay Together: Logitech G Reveals Gaming Couples Enjoy Higher Relationship Satisfaction

With Valentine’s Day right around the corner, many lovebirds across Australia are planning for the m...

AI threatens to eat business software – and it could change the way we work

In recent weeks, a range of large “software-as-a-service” companies, including Salesforce[1], Se...

The Times Features

Cobram Estate | Heart Health Month Backed By Science

A dedicated time to elevate awareness of cardiovascular wellbeing and support healthier lifestyles...

Heidi Launches Evidence and Acquires AutoMedica to Accelerate Its AI Care Partner Platform

New evidence layer and UK acquisition expand Heidi’s role across the clinical workflow Heidi, the...

OUTRIGGER Resorts & Hotels Elevates Wellness Travel in 2026 With Immersive New Programs in the Maldives

Movement, mindfulness and hands-on rituals anchor a renewed wellness focus at OUTRIGGER Maldives Maa...

Major maintenance dredging campaign begins at Port of Devonport

TasPorts will begin a major maintenance dredging campaign at the Port of Devonport next week, su...

AI could help us more accurately screen for breast cancer – new research

At least 20,000[1] Australian women are diagnosed with breast cancer each year. And more than ...

Housing ACT tenants left in unsafe conditions

An ACT Ombudsman report has found that Housing ACT tenants have been left waiting in unsafe and haza...

Shark SteamSpot S2001 Review: A Chemical-Free Way to Tackle Messes and Stubborn Stains

If you're looking for a reliable steam mop that can handle both everyday spills and stubborn stains ...

How Businesses Are Generating Profits in a High-Inflation Economic Environment

Inflation in Australia and globally has surged to multi-decade highs since 2021, driven by pande...

The Effects of the War in the Middle East on Australian Small Businesses

The war in the Middle East is not a distant geopolitical event for Australia. In an interconnect...