After Roe v Wade, here’s how women could adopt ‘spycraft’ to avoid tracking and prosecution
<p>The art of concealing or misrepresenting one’s identity in the physical world has long been practised by spies engaged in espionage. In response, intelligence agencies designed techniques and technologies to identify people attempting to hide behind aliases.</p>
<p>Now, following the US Supreme Court ruling overturning Roe v Wade, women in the United States seeking assistance with unwanted pregnancies have joined the ranks of spies.</p>
<p>The ruling has resulted in several trigger laws coming into effect in conservative states to outlaw abortions in those states. These laws, coupled with groups targeting women’s reproductive rights protests, have raised fear among women of all ages about their data being used against them.</p>
<p>Thousands have engaged with online posts calling on women to <a href="https://www.theguardian.com/world/2022/jun/28/why-us-woman-are-deleting-their-period-tracking-apps" target="_blank" rel="noopener">delete their period tracking apps</a>, on the premise that data fed to these apps could be used to prosecute them in states where abortion is illegal. At the same time, abortion clinics in New Mexico (where abortion remains legal) are <a href="https://www.reuters.com/world/us/new-mexico-shields-abortion-providers-ahead-expected-patient-surge-2022-06-27/" target="_blank" rel="noopener">reportedly</a> bracing for an influx of women from US states.</p>
<p>As someone who has served as a special agent for the United States Army and Federal Bureau of Investigation, and as a Senior Intelligence Officer with the US Defense Intelligence Agency, I can tell you deleting period tracking apps may not be enough for vulnerable women now.</p>
<p>But there are some tools women can use to conceal their identities, should this be necessary – the same tools once reserved for professional spies.</p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Menstrual tracking app Stardust is one of Apple’s top three most-downloaded free apps right now. It’s also one of few apps that has said it will voluntarily—without being legally required to—comply with law enforcement if it’s asked to share user data. <a href="https://t.co/sJ17VAiLvp">https://t.co/sJ17VAiLvp</a></p>
<p>— Motherboard (@motherboard) <a href="https://twitter.com/motherboard/status/1541456351414583297?ref_src=twsrc%5Etfw">June 27, 2022</a></p></blockquote>
<p><strong>The privacy myth</strong></p>
<p>Apart from espionage, the emergence of the internet created a new impetus for widespread data collection by data aggregators and marketers. The modern surveillance economy grew out of a desire to target products and services to us as effectively as possible.</p>
<p>Today, massive swathes of personal information are extracted from users, 24/7 – making it increasingly difficult to remain unmasked.</p>
<p>Data aggregation is used to assess our purchasing habits, track our movements, find our favourite locations and obtain detailed demographic information about us, our families, our co-workers and friends.</p>
<p>Recent events have demonstrated how tenuous our privacy is. <a href="https://www.theverge.com/2019/10/22/20926585/hong-kong-china-protest-mask-umbrella-anonymous-surveillance" target="_blank" rel="noopener">Protests in Hong Kong</a> have seen Chinese authorities use cameras to identify and arrest protesters, while police in the US deployed various technologies to identify <a href="https://theconversation.com/police-surveillance-of-black-lives-matter-shows-the-danger-technology-poses-to-democracy-142194" target="_blank" rel="noopener">Black Lives Matter</a> protesters.</p>
<p>Articles appeared in Australian <a href="https://www.crikey.com.au/2022/06/29/protests-police-government-surveillance-how-to-avoid/" target="_blank" rel="noopener">media outlets</a> with advice on how to avoid being surveilled. And people were directed to websites, such as the <a href="https://www.eff.org/wp/behind-the-one-way-mirror" target="_blank" rel="noopener">Electronic Frontier Foundation</a>, dedicated to informing readers about how to avoid surveillance and personal data collection.</p>
<p>What we’ve learned from both spy history and more recent events is that data collection is not always overt and obvious; it’s often unseen and opaque. Surveillance may come in the form of <a href="https://theconversation.com/surveillance-cameras-will-soon-be-unrecognisable-time-for-an-urgent-public-conversation-118931" target="_blank" rel="noopener">cameras</a>, <a href="https://theconversation.com/how-to-hide-from-a-drone-the-subtle-art-of-ghosting-in-the-age-of-surveillance-143078" target="_blank" rel="noopener">drones</a>, automated number plate readers (<a href="https://theconversation.com/number-plate-recognition-the-technology-behind-the-rhetoric-17572" target="_blank" rel="noopener">ANPR/ALPR</a>), <a href="https://www.q-free.com/reference/australia/" target="_blank" rel="noopener">toll payment devices</a>, <a href="https://www.dhs.gov/publication/acoustic-surveillance-devices" target="_blank" rel="noopener">acoustic collectors</a> and of course any internet-connected <a href="https://theconversation.com/smartphone-data-tracking-is-more-than-creepy-heres-why-you-should-be-worried-91110" target="_blank" rel="noopener">device</a>.</p>
<p>In some cases when your fellow protesters upload images or videos, crowd-sourced intelligence becomes your enemy.</p>
<p><strong>Data deleted, not destroyed</strong></p>
<p>Recently, a lot of the focus has been on phones and apps. But deleting mobile apps will not prevent the identification of an individual, nor will turning off location services.</p>
<p>Law enforcement and even commercial companies have the ability to access or track certain metrics including:</p>
<ul>
<li>international mobile subscriber identity (IMSI), which is related to a user’s mobile number and connected to their SIM card</li>
<li>international mobile equipment identity (IMEI), which is directly related to their device itself.</li>
</ul>
<p>Ad servers may also exploit device locations. Private companies can create advertisements targeting devices that are specific to a location, such as a women’s health clinic. And such “geofenced” ad servers can identify a user’s location regardless of whether their location settings are disabled.</p>
<p>Further, anonymised phone track data (like call signals pinging off nearby towers) can be purchased from telecommunications providers and de-anonymised.</p>
<p>Law enforcement can use this data to trace paths from, say, a fertility clinic to a person’s home or “bed down” location (the spy term for someone’s residence).</p>
<p>The bottom line is your phone is a marker for you. A temporary cell phone with an overseas SIM card has been the choice for some people wishing to avoid such tracking.</p>
<p>Adding to that, we recently saw headlines about <a href="https://theconversation.com/bunnings-kmart-and-the-good-guys-say-they-use-facial-recognition-for-loss-prevention-an-expert-explains-what-it-might-mean-for-you-185126" target="_blank" rel="noopener">facial recognition technology</a> being used in Australian retail stores – and America is no different. For anyone trying to evade detection, it’s better to swap bank cards for cash, stored-value cards or gift cards when making purchases.</p>
<p>And using public transport paid with cash or a ride-share service provides better anonymity than using a personal vehicle, or even a rental.</p>
<p>In the spy world, paying attention to one’s dress is critical. Spies change up their appearance, using what they call “polish”, with the help of reversible clothing, hats, different styles of glasses, scarves and even masks (which are ideally not conspicuous these days). In extreme cases, they may even use “appliances” to <a href="https://www.wsj.com/articles/the-cias-former-chief-of-disguise-drops-her-mask-11576168327" target="_blank" rel="noopener">alter their facial characteristics</a>.</p>
<p>Then again, while these measures help in the physical world, they do little to stop online detection.</p>
<p><strong>Digital stealth</strong></p>
<p>Online, the use of a virtual private network (<a href="https://theconversation.com/explainer-what-is-a-virtual-private-network-vpn-12741" target="_blank" rel="noopener">VPN</a>) and/or the onion browser, <a href="https://theconversation.com/explainer-what-is-the-dark-web-46070" target="_blank" rel="noopener">Tor</a>, will help improve anonymity, including from internet service providers.</p>
<p>Online you can create and use multiple personas, each with a different email address and “personal data” linked to it. Aliases can be further coupled with software that removes cookies and browser history, which will help conceal one’s online identity.</p>
<p>One example is <a href="https://www.ccleaner.com/ccleaner/download" target="_blank" rel="noopener">CCleaner</a>. This program removes privacy-violating cookies and internet history from your device, while improving your device’s privacy.</p>
<p>There are also plenty of online applications that allow the use of <a href="https://theconversation.com/dont-be-phish-food-tips-to-avoid-sharing-your-personal-information-online-138613" target="_blank" rel="noopener">temporary email addresses</a> and phone numbers, and even temporary accommodation addresses for package deliveries.</p>
<p>To some, these may seem like extreme privacy measures. However, given the widespread collection of identity data by commercial companies and governments – and the resultant collaboration between the two – there’s reason to be concerned for anyone wanting to fly under the radar.</p>
<p>And for women seeking abortions in the US, these measures may be necessary to avoid prosecution.</p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Not to be that guy but it seems like it really should be bigger news that the national guard is now helping crack down on abortion protests <a href="https://t.co/DGh83in0Cm">https://t.co/DGh83in0Cm</a></p>
<p>— Read Wobblies and Zapatistas (@JoshuaPotash) <a href="https://twitter.com/JoshuaPotash/status/1541527897273409536?ref_src=twsrc%5Etfw">June 27, 2022</a></p></blockquote>
<p><em><a href="https://theconversation.com/profiles/dennis-b-desmond-1252874" target="_blank" rel="noopener">Dennis B Desmond</a>, Lecturer, Cyberintelligence and Cybercrime Investigations, <a href="https://theconversation.com/institutions/university-of-the-sunshine-coast-1068" target="_blank" rel="noopener">University of the Sunshine Coast</a></em></p>
<p><em>This article is republished from <a href="https://theconversation.com" target="_blank" rel="noopener">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/after-roe-v-wade-heres-how-women-could-adopt-spycraft-to-avoid-tracking-and-prosecution-186046" target="_blank" rel="noopener">original article</a>.</em></p>
<p><em>Image: Getty Images</em></p>