Feb. 2nd, 2012

thewayne: (Default)
"A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity. The document, part of a program called 'Communities Against Terrorism,' lists the use of 'anonymizers, portals, or other means to shield IP address' as a sign that a person could be engaged in or supporting terrorist activity. The use of encryption is also listed as a suspicious activity along with steganography, the practice of using 'software to hide encrypted data in digital photos' or other media. In fact, the flyer recommends that anyone 'overly concerned about privacy' or attempting to 'shield the screen from view of others' should be considered suspicious and potentially engaged in terrorist activities. ... The use of PGP, VPNs, Tor or any of the many other technologies for anonymity and privacy online are directly targeted by the flyer, which is distributed to businesses in an effort to promote the reporting of these activities."

I use VPN every day to remote in to work as does my wife. Makes me tempted to use steganography to embed my name and email address on every photo that I post online.

A comment on Slashdot related the story of a Reagan/Bush drug war flyer that people acting weird were probably on drugs and someone not acting weird was probably on drugs but covering it up very well.

Welcome to 100% of the country being a suspected terrorist. I guess privacy is now RIP.

http://yro.slashdot.org/story/12/02/02/1719221/do-you-like-online-privacy-you-may-be-a-terrorist
thewayne: (Default)
From this DOJ flyer. Things that I could be considered suspicious are bold.

 Are overly concerned about privacy, attempts to shield the screen from view of others
 Always pay cash or use credit card(s) in different name(s)
 Apparently use tradecraft: lookout, blocker or someone to distract employees
 Act nervous or suspicious behavior inconsistent with activities
 Are observed switching SIM cards in cell phone or use of multiple cell phones
 Travel illogical distance to use Internet Café
Activities on Computer indicate:
 Evidence of a residential based internet provider (signs on to Comcast, AOL, etc.)
 Use of anonymizers, portals, or other means to shield IP address
 Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
 Encryption or use of software to hide encrypted data in digital photos, etc.
 Suspicious communications using VOIP or communicating through a PC game
Use Computers to:
 Download content of extreme/radical nature with violent themes
 Gather information about vulnerable infrastructure or obtain photos, maps or
diagrams of transportation, sporting venues, or populated locations
 Purchase chemicals, acids, hydrogen peroxide, acetone, fertilizer, etc.
 Download or transfer files with “how-to” content such as:
- Content of extreme/radical nature with violent themes
- Anarchist Cookbook, explosives or weapons information
- Military tactics, equipment manuals, chemical or biological information - Terrorist/revolutionary literature

- Preoccupation with press coverage of terrorist attacks
- Defensive tactics, police or government information
- Information about timers, electronics, or remote transmitters / receivers


I especially love the last line of the flyer:

It is important to remember that just because someone’s speech, actions, beliefs, appearance, or way of life is different; it does not mean that he or she is suspicious.

I am a licensed amateur radio operator, which gives me an interest in electronics and radios. I am a photographer and a cook, which gives me an interest in timers and chemicals. I worked for the police department for nine years and for government in general for about 20 now, so I have an interest there. I don't let people see my computer screen if I'm signing on to work. I play World of Warcraft and have been known to use in-game VOIP to talk to team-mates. I used to buy magazines on military tactics, plus I'm a gamer. I thought the 'preoccupation with press coverage of terrorist attacks' was lovely, pretty much every American on 9/11 and a week subsequent would therefor be suspicious. And signing on to an internet provider? Now EVERYONE on the internet is suspicious?

But remember -- just because someone is different doesn't mean that he or she is suspicious. If you stick out, you will be hammered down. So watch the Superbowl, drink beer, drive an American 4x4, and never use a computer or any other electronic equipment. There was a sig on Slashdot that said '1984 is not an instruction manual', well, it certainly became one, regardless of what George was writing about.

May 2026

S M T W T F S
     12
34 56789
10111213141516
17181920212223
24252627282930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated May. 6th, 2026 07:39 am
Powered by Dreamwidth Studios