Chapter 5. Low tech targeting and surveillance

How much could they find out about you?

Information in this chapter
• Initial Identification
• Property Records, Employment, and Neighborhood Routes
• Disclosure on Social Networks and Social Media
• Financials, Investments, and Purchase Habits
• Frequented Locations and Travel Patterns
• Third-Party Disclosures
• Use of Signatures
• Automated Surveillance
• Target Interaction
• Scanners and Miniatures
Years ago, surveillance required an ample investment in time, expertise, energy, and usually money on the part of the person(s) conducting the surveillance. Today, anyone can do it with just a laptop, iPad, or smartphone and an Internet connection. Surveillance techniques have expanded along with the amount of information available on the Internet. And in the past few years, with the explosion of social networking and social media sites, resources for conducting surveillance have likewise proliferated. This means that anyone, anyplace, and at any time can collect data on a target, and then conduct surveillance of that target from the comfort of his home, cybercafé, coffee shop, or office; no hacking, cracking, encryption breaking, or server compromising required. This chapter details the methods surveillers use to gather information on a target, regardless of where the information resides—on the Internet, blogs, social networking sites, social media sites, micro-blogs, or websites.
Key Words: Blippy, Facebook, LinkedIn, Peer-to-Peer network search, PeopleFind site, Social media site, Social networking site, Surveillance, Twitter, Wi-Fi scanner
Back in the day, surveillance necessitated a great deal of strategy, research, time, equipment, vehicles, travel, disguises, and of course, bad coffee. If you've never had the opportunity to actually conduct surveillance operations, you have certainly seen the drill in the movies and on TV. Law enforcement, private security specialists, spies, military units, disgruntled spouses, and private investigators have been the typical characters on the big screen (and in real life) whose business it is to surveil, collect, and document information on their target(s). In addition to some of the movie protagonists, their adversaries have launched their own intelligence-gathering and surveillance techniques and counter surveillance measures.
In the past and certainly today, people still want to find out about people. Historically and psychologically the search for people and the motivations to find information about them has remained consistent over time. Whether you are a celebrity, high profile person, fugitive, or just an average Joe, someone may be looking for you. The surveiller may be as innocent as a former classmate who has not seen you in years or a lost relative or more threatening, such as an angry ex-spouse, cheated business partner, or stalker. The good news was years ago, for someone to really surveil you, a lot of time, expertise, energy, and perhaps money would have had to be invested in conducting that type of activity. The bad news is…today, anyone can do it with just a laptop, iPad, or Smartphone and an Internet connection.
The surveillance techniques used over the past several decades have required “feet on the street” operations. Years ago, if you wanted to find someone or additional information about them, you would have to start with the basics and then typically launch into the classic tailing and documenting of evidence. But even the basics, the presurveillance activities and preliminary information collection, took time. The research conducted revolved around finding hard copy records, usually in libraries, courthouses, county repositories, or archives. Additional records could be obtained through sifting through miles of microfilm and microfiche. Once foundational information such as name, address, or phone number is located, then other parts of the operational plan had to be considered and investigated—by foot, by travelling, by doing more hard copy research (e.g., reviewing maps). Even if you were fortunate enough to have access to law enforcement databases to obtain the first layer of information, at some point if you are going to do surveillance, you have to get out there and actually monitor, tail, collect, wiretap (of course with a warrant!), photograph, videotape, run audio collections (of course within the legal constraints of your state or jurisdiction), or dumpster-dive the target(s). Thus, the second level of operational planning is needed and likewise time consuming—getting to know the target and the environment before establishing the surveillance plan.
During this second phase of planning, surveillers know it is important to understand the operational environment. What is the neighborhood like? Where does the target work? What would be the likely routes? How much foot traffic? How many autos and what types? What appears to be normal and what will stick out? Is a disguise needed? Is changing vehicles needed? How should the surveillance detection routes be planned? What vantage points are needed to attain photos? Video? Audio? The preparation list goes on and on, including considerations such as “What is the cover story?” and “What if the operation is blown?”
Now that all the preparation is completed and the surveillance plan is selected based on the target, the location, the environment, and the goal of the intelligence collection, the actual surveillance can begin. While some investigators feel this is the most interesting, challenging, and exciting part of the operation, it can also be long, tiring, deadly dull, and dirty work at times. Spending night after night, lurking in a van in some neighborhood ready to surface with a stealthy click of the camera in order to collect the one or two incriminating photos, can be exhausting. Too many cups of coffee, fast food, and lack of sleep just don't help to put you in the mood for the next joyous exercise of waiting for the target and all the neighbors to leave for school and work in the morning so you can rifle through their garbage. Don't forget to watch for Mrs. Smith: she only comes out of her home to garden and she may notice you even though you have changed vehicles three times. This lady won't buy the world's best cover story if she sees you going through the trash. Although all the time spent tailing, observing, listening, watching, photographing, and videotaping can provide very thrilling results that are crucial to the investigation, you are exhausted. Understanding the patterns of the targets, where they go, what they eat, who they talk to, who their friends and business associates are, and who they love and hate, becomes an integral part of the puzzle and the investigation.
All of the data and intelligence collected while conducting surveillance can then be distributed according to the parameters of the investigation: presented to the client, delivered to the prosecutor or defense team, or used as personal fodder for some other agenda. Again, that was a lot of time, effort, travel, sleepless nights and planning needed to achieve stellar surveillance results. Using the open source tools available on the Internet today makes the art, science, and expansion of surveillance so much easier than it was in years past.
The methodologies and techniques of surveillance have expanded over the last 5 to 10 years by the amount of information that is available on the Internet. Over the last 2 to 3 years, with the explosion of social networking and social media sites, the available sources of information to conduct surveillance have likewise proliferated. So, what does that mean exactly? Basically, anyone, in any place, at any time can now conduct some of the preliminary and secondary data collections on a target, and then actually conduct surveillance of that target from the comfort of their own home, cybercafé, coffee shop, or office by using a laptop, iPad, or Smartphone. The information is there to collect in the open source, meaning that no one needs to hack, crack, break encryption, or otherwise compromise servers to collect information on a target. The information is out there on the Internet, on blogs, on social networking sites, on social media sites, on microblogs, and on websites. So how much information is out there on you? What if you were surveilled online?
This chapter focuses on methods surveillers can use to gather information about you. Presented in the coming pages are some basic collection techniques used by anyone who wants information about you, your organization, your company, or your family. In addition to providing some of the methodologies used in online surveillance, this chapter provides recommendations to reduce your Internet footprint and better preserve your safety, security, and privacy online. This chapter only scratches the surface on all of the creative methods, techniques, and sources used in online surveillance, but it should provide you a good overview of what can be collected from the convenience of any location, with a cup of great coffee, adequate sleep, and no dumpsters.

Initial identification

Most investigations start with a name. If someone is going to surveil you, the most obvious and easiest place to start is with your name. In some cases, the surveiller may just start with an address, a phone number, an email address, or a screen name. In any case, starting with just one piece of data is not unusual and it is the job of the investigator/surveiller to build on that single piece of information. Let's start with your name. There are literally dozens of Internet sites in which to attain more information from than just your first and last names. For example, the following websites offer up information such as home address, home phone number, cell phone number, or email address by just putting in your name. In some cases, the sites, such as pipl.com and isearch.com will also provide lists of your potential relatives or associates:
For example, http://www.peoplelookup.com offers several types of look-ups via tabs on the same site, including reverse phone number search, background check, criminal check, social networking check, email look-up, property check, and civil record checks (i.e., court records, death records). Zabasearch.com is another interesting site. Anyone can enter your name and the state in which you live (which in many cases is a very educated guess if it is not readily known). The results of Zabasearch produce home addresses, home phone numbers, and in some cases the history of where you have lived. The useful thing about Zabasearch is that if your address is found, a “Find” on the page using your address can be conducted to see if others are also listed living in your home. This is a great way to find spouses' names or children's names.
Another good alternative is https://www.knowx.com (which is a Lexis-Nexis company). This site offers information and records pertaining to bankruptcy; judgments; lawsuits; liens; criminal records, certificates (i.e., death, divorce, marriage, birth); vehicle ownership, which may include aircraft, real estate, and watercraft; business profiles; and professional licenses. The number of sites that offer a variety of personal information are too voluminous to provide a comprehensive list. New sites keep coming out and the existing sites adapt to offer more options.
Tip
Please note that some of these PeopleFind sites require a fee to obtain additional information. Be mindful and careful about providing credit card numbers or personal information such as your email address to some of these services. In many cases, the additional information is not worth exposing your name, credit card details, or email address. If you do select to use the pay-for services, use a throwaway email address and pay for the services with PayPal or a credit card that can be monitored for fraud. It may be safer to be persistent with the free sites. Someone who is looking for you and is determined will, however, use every tool available and purchase the information with throwaway email addresses and stolen credit cards.
Using one or multiple PeopleFind sites can yield a great deal of information. It is not unusual to at least obtain some additional pieces of information such as a home address or email address. Then the surveiller may use open source search engines such as Google, Google Advanced, Google Groups, Google Blog, Ask.com, Yahoo, and Bing, to name a few, to enter your name, email address, screen name, address, or phone number to see if any other information or records surface.
Warning
Our team was provided the name of one woman who happened to be the wife of a high profile CEO of a Fortune 500 company. Just by using Zabasearch, Pipl, and Yahoo People Find, we were able to attain the home address of the target. Moving on very easily to just a rudimentary Google search using her home address, three additional pieces of information popped up immediately: 1) a copy of an “approval” document from the city to allow her to build a swimming pool in the backyard, which contained her cell phone number; 2) photographs of her (and her family including children) at a charity event (even more was collected using a simple image search); and 3) sites that showed her political donations over the last 5 years, along with an additional address in the same state (but this one turned out to be a vacation home). These findings led to more findings, led to more findings, etc… This is the type of information an adversary or protester may use against her, her husband (and his company), or their family. In this case, the executive's wife did not post any of this information herself and she did not know it was out there.
Once information in addition to your name is collected (e.g., your address), there are additional state-by-state searches and databases that can be accessed to see if you or your activities have been catalogued. For example, if a Google search turns up some information that you were involved in a small claims case in New York, it simply takes a few more clicks of the mouse to find out what the case entailed. By going to http://www.nyscourtofclaims.state.ny.us/decisions.shtml, anyone can do a search on your name, the judge's name, the case dates, or some key words to bring up more details.
If you are in a certain profession (e.g., physician) or are former or current military, some searches can be conducted specifically for you. By just Googling “find military personnel,” a set of possible sources of information is presented. Some of these sources require a login or an account, but most of them are free. For example, Military.com requires the user to put in their service branch, status (which can be “other”), email address, and a zip code. Again, with a throwaway email address and entering a non descript status, anyone can surf this database. Just with this first step of searching and digging, a lot of information can be uncovered about you. To gather a better idea of your neighborhood, your property, and your job, let's move onto finding and viewing your property, job, and routes.
Warning
A typical question is, how can I get this information removed from the Internet? The truth is, you really cannot get any of your information actually removed from the Internet. For example, some sites offer a “remove me” service in which you fill out a form and in theory you are removed from their site. While that may be true and ABC.com did take you out of their database, the problems stem from crawlers, spiders, indexing, archives, caches, and other people who copy, reproduce, repost, or resurf for the information and keep it alive on the Internet. In many cases these PeopleFind sites will remove you from their data, but then when their Internet spiders go out to collect another round of information about people, your name and affiliated information may get scooped again and displayed on their site. These are automated collections that are difficult if not impossible to stop. There are techniques available to “bury” some findings on the twentieth page on Google instead of the first page, but even those methods don't guarantee that you won't be found. Just be warned that, once it is out there, it will live and it can be found.

Property records, employment, and neighborhood routes

Extending the search about you, the next step is to do some virtual drive-bys of your home, find out where you work, and then theorize on some of the local routes you may take to work, the nearest grocery stores, the movies, and restaurants. In traditional surveillance, it is best to understand the environment—the target's neighborhood; what the homes look like; the routes in and out of the neighborhood, the year, make/model, and upkeep level (or lack thereof), of neighborhood cars; and what access to the target's home and/or garbage may be available. Attaining additional information about other properties, assets, and vehicles would also be highly useful in many circumstances.
Once your address is known and validated, it is very easy to attain additional information about that property, even before you have been the resident. By using some of the real estate and property-find search engines, anyone can gather more detailed information. Take these sites, for example:
Zillow.com provides maps, home values, photos, mortgage information, and links to local area information such as grocery stores, schools, parks, and gas stations. Gathering all of this information from one site is pretty good. But, if the surveiller then places the address information into Google Maps for a satellite view and for a street view, a real view of the home is provided. By using street view, anyone can walk around the home, the neighborhood, and assess the cars, property, roads, distance between homes, and other details. By closely assessing the details. on street view, an enormous amount of information can be attained about the environment. Granted, the virtual maps are not in real time, but an excellent cursory review of the home and environment can be ascertained without actually driving anywhere.
Once the neighborhood is reviewed, Google Maps (or any online mapping program or Smartphone app) can guide the surveiller to the local stops—the grocery stores, the post office, gas stations, and coffee shops—that you might frequent. While these techniques will not provide the level of detail of live activity in the neighborhood, the information can be coupled with additional online intelligence to indicate where and when you come and go.
Warning
Do research on your own home to see how exposed you could be. It is possible that the home you live in may have been photographed, currently or in the past, by a prior owner. Some real estate agents present not only photos but also virtual tours of homes highlighting the interior and exterior of homes. If your home is high profile, it may have been documented in an architectural magazine or design journal with full blueprints and architect drawings. Now armed with not only basic street view information but also actual video and blueprints, the surveiller has information about the residence in overwhelming detail including the furniture and blueprints. Maybe there is even a panic room.
One place you probably go is to work (or school) or some other location (i.e., a friend's home, a relative's home, volunteer work facility). If you are “easy,” meaning you attend and/or speak at conferences, have a website, have a web presence, participate in public relations activities, or do press conferences, you are probably very easy to find with a Google search. Your company, your organization, and your marketing personnel will have posted information about you on the company website (and in some cases which conferences you will be attending next or where your next press conference will be). If you are not that public in terms of your organization, let's revert back to some of the information already found through PeopleFinders and other techniques. Using a found email address or phone number, again, a very simple publicly available search engine can potentially detect where you may have posted your email address, phone number, or screen name. Do you use eBay or Craig's list or post information to forums, message boards, or news groups? Have you ever posted your phone number because you are selling an item, renting an apartment, or just reaching out to someone for assistance? While some people do use hotmail, gmail, or other nonwork-specific email addresses to post online, it is surprising how many people in a moment of convenience or through habit will provide their work email addresses, work phone numbers, or other information that discloses their employer. If you have a website or are responsible for your employer's website, doing a domain search for registration information may also provide contact information or validation of an employer.
OK, now that we know where you live and where you work with some rudimentary idea of places you may frequent, we still need to know your habits, your behavior, and your comings and goings. The first place to start collecting information on the patterns of your behavior is to target social media and social networking sites.

Disclosure on social networks and social media

Social media and social networking sites (i.e., LinkedIn, Facebook, MySpace, Twitter, Flickr) are filled with information. The membership of these sites is growing and new ones are popping up every day. Some of the self-disclosure that occurs on Facebook, for example, is amazing. These sites are chock full of demographic information, photographs, names of others such as friends, family, and survey data. Yes, survey data. One very popular thing to do is to share and post surveys with the answers to very personal questions—Where do you work? Do you like your boss? Do you do drugs? When was the last time you got drunk? Do you suffer from mental illness, and if so, what are you diagnosed with? And, yes, even more remarkably, people answer these questions and post the whole survey on their social networking page.
Remember years ago when people had diaries. With the little lock and key? Younger brothers everywhere made it their mission to crack into their sisters’ diaries to find the secrets. No need now. People just put it right out there on Facebook for everyone to see. What about your Rolodex? Those used to be coveted compilations of information: your network, your confidential business contacts, your close and extended family members. The Rolodex was personal intellectual property. Jobs were given to salespeople who had the best personal contacts. Power, status, and success were perceived and guided by who you knew and who you personally had access to. No more. Enter LinkedIn. Like the diary, LinkedIn is just a huge disclosure of your Rolodex. LinkedIn is one of the prize collections of the surveiller and again, so easy to get access to even if the majority of your account is closed. That's right, even non members of LinkedIn or Facebook and those who are not in your friend network can have a peek into what you post and what is on your Facebook wall or who your network is on LinkedIn. A number of available search engines provide that “view through the fence,” so let's look at Whostalkin.com.
By entering search terms into Whostalkin.com, you can see a host of findings from a variety of sites. For example, if you enter “America” in the search box, a lot of results will popup and some will be from Facebook. A few lines of text from that Facebook account will appear in the search results. However, if you click on the link to that specific Facebook page, you will be sent to the Facebook login page. So without actually logging into Facebook or being a friend of that poster, you have that peek into his or her commentary. Other useful and available searches into social networks include:
http://www.yoname.com/—people search across social networks
http://www.zuula.com—search for web, blogs, Twitter
http://www.icerocket.com—search for web, blogs, MySpace
http://www.tweetscan.com—search on Twitter
http://www.youropenbook.org—search on FaceBook
Each of these search engines is a bit different and can provide distinct results. Tweetscan is interesting and can be more fruitful than going directly to Twitter.com for a search of your Tweets and Twitter names. For example, if you are the Tweeter and you Tweet, “I hate my boss Bob. I think I will slash his tires on my way out” (Note: Yes, these types of Tweets do exist and are posted every day), as the Twitter account owner, you can retract your Tweet. What this means is that if a search is done on Twitter.com for “+hate +Bob” your Tweet will no longer be available to view and will not be in your page of Tweets. However, if Tweetscan.com is used and “+hate +Bob” is placed in the search bar, results will reveal your retracted Tweet. This phenomenon occurs because Twitter.com keeps up with changes made by their users. Tweetscan archives and indexes Tweets and once they are indexed, they live and thrive and can be searched. Always remember, nothing really disappears or can be deleted from the Internet. Likewise, if there are some older Tweets that need to be uncovered to develop that target profile, there are several archive engines available, two of which include BackTweets and Snapbird.
Note
This example is a real-life case study. The job was to surveil a specific businessman to assess what his next investment strategy or business plans would be over the next few months. In addition to following him on Twitter, which mostly provided benign data, it did provide information about his speaking engagements. Knowing where he spoke provided the “in” needed to send him a LinkedIn invitation, which he readily accepted. Now insight into his network was available. What became very revealing was the combination of information—Tweets provided information that suggested this businessman had traveled to City X several times over the past month (interestingly enough, his main competitor's HQ was in City X). Next came the new LinkedIn associates, who were two attorneys. Typically this target did not have a lot of lawyers in his network. A quick Google search on these attorneys showed that they were prominent M&A attorneys. Now, 1 + 1 = 2. The next business move was that the target was probably in merger or acquisition discussions with his main competitor. This was significant intelligence and found so much more easily than following him around in unmarked cars, skulking around large plants in restaurants to see who he was meeting with, and where he was going.
The beauty of these social networking sites is that they are meant to network people. So, in many cases people present a link to their Twitter account on their Facebook page or links to their Facebook and Twitter pages on their LinkedIn profile. This makes the job of information assemblage so easy. The key to really gathering insight into a person is not to evaluate the person by an isolated Tweet, one blog, or a comment on Facebook, but to compile these postings over time. The surveiller wants all of your Tweets over time, months and months of your blog postings and a collection of all of your friends and associates. Thus, the amassment of all of this information over time is what provides a very nice picture and profile of the target. Supplementing all of this text-based information with images, video, and photos from Flickr, Photobucket, and YouTube can also add to the overall profile.
Tip
Problem: the surveiller is not a member of LinkedIn, Facebook, or Twitter or doesn't want to login with his or her real account data. No problem. There are sites that will allow the surveiller to use someone else's login data. For example, http://www.bugmenot.com contains login data to approximately 14,000 different sites. Bugmenot includes login credentials to popular sites such as Blogspot.com, Foursquare.com, Myspace.com, Xanga.com, Intelius.com and Blippy.com. While certain sites are blocked from Bugmenot.com, such as Facebook.com, Linkedin.com and Twitter.com, the surveiller can still target you by going to other login share sites such as http://login2.me and attain access to Facebook, Twitter, and LinkedIn.
It is difficult to exhaust the potential information that is available on social network and social media sites. The process of surfing, searching, and digging does take time. There is an art and a science to knowing which search terms to enter, how to use Boolean strings and search punctuation, and tricks within Google Advanced to narrow down searches. However, as much time and energy as surfing may take, it can still be done by anyone, anywhere. Implementing the right Boolean strings using “OR” “ADD,” or “-” between terms is experimental until you find the right combination. And then applying those strings in Google Advanced, for example, to narrow the date fields or the domain fields and determining what “exact terms to use (or request be removed from the search) make up another layer to the overall search and decision-making process. For the surveiller who now may have more than just cursory information about you, digging deeper is still necessary. Finding out about your finances, purchase habits, and maybe more about your job and salary is next on the agenda.

Financials, investments, and purchase habits

Financial data may be very critical and useful information for a surveiller to attain on you. There are a myriad of ways to collect this information online and a number of ways people unwittingly disclose this information. In other instances, it is someone else or another entity or organization that is revealing this data. Many people may be interested in your finances, everyone from a curious neighbor, to a new employer, to an investigator who is trying to determine if you are hiding funds. Let's look at just a few ways this type of information is made public.
First, some of the PeopleFind sites do offer financial checks and background checks but they are provided for a fee. Some sites provide worthwhile information and some don't. It is a bit of the luck of the draw whether or not you end up receiving valuable information. The fees are not high—ranging between $29.99 and $99.99, but the bigger risk to the vendor may be providing a credit card number to purchase the financial report. As mentioned earlier, some unscrupulous surveillers will provide a stolen credit card's number to purchase the needed information. The assets that are registered for tax or license purposes, such as houses, property, vehicles, boats, and aircraft may be the most straightforward to search for and identify. For a free search, there are hundreds of free sites dedicated to boat owners, airplane enthusiasts, and real estate entrepreneurs. If the surveiller has your email address, screen name, or other information, these sites are worth checking as asset owners typically love to discuss the make/model/purchase date of their cherished item, and with that data, the estimated value of the asset is easily determined.
There are other ways to gather salary information online without paying for services or worrying about credit card numbers. One starting point may be the government databases that offer salary information for government (city, state, and local) employees. If the target is employed by the government, it is easy to find their salary. For example, if you are the target and you are employed by the Kansas City government, a search of the state database for salary is available. Searches can be done by first and last name or by the target's position. In this example, the database link is provided by the Kansas City Star online news source at http://www.kansascity.com/2008/04/09/568285/search-the-kansas-city-salary.html.
It just takes a quick Google or Bing search with +“target city” OR +“state name” + “government salary data” as the search terms and lots of resources will be presented. It may take a few tries to get to the correct database, but each state/city has one and they are all online.
If you are not a government employee, there are other techniques to collect your data. One search that can be conducted is to use Peer-to-Peer (P2P) network searches for disclosed documents, specifically for tax records. If at any time you have saved your tax filings and records on your home computer and then allowed that computer to access a P2P network (either with or without your knowledge—teens are notorious for downloading free movies and music), it is possible that without the correct settings the contents of your hard drive were also exposed to the P2P network. Basically this means that all of your files are now on the loose on P2P for anyone to see. Using any of the popular P2P networks, search for “1040,” “1099,” “W2,” or “tax form” and the name of the target—even if the target's tax file does not pop up, you will be surprised how many others do. Of course, this piece of information discloses not only annual earnings and taxes owed or refunded but also social security numbers, a treasure trove of information. Likewise, searching for other documents related to insurance claims (using the standard claim numbers) can also be done on P2P.
Warning
Poking around on P2P can be a bit dicey. These platforms are wrought with pirated and free versions of music, videos, and other free ware. The time spent surfing and reviewing P2P files is one concern. However, the bigger concern is acquiring some type of malware by clicking on these findings. Use a virtual machine environment if possible.
If the target is an investor or dabbler in the stock market, they may post to a variety of financial newsgroups, chats, or forums. Sites like YahooFinance are the places to check. Some people even have their own blogs dedicated to the stocks they own and follow, and they provide their own advice about investing. Typically, these bloggers divulge their own investments and all of the smart investments they have made. Followers or commenters to these forums or blogs may also present information about the target. These followers may be fellow investors, former or current business partners, relatives, or old college chums. At any rate, sometimes it is not the target who discloses their own network but a close friend, family member, or colleague. In fact, the disclosure could accidentally come from the target's company, benefits organization, or human resources department. While it is rare (thankfully), at times new company databases or web pages are not secured and are left open. Or spreadsheets are left visible on the open Internet or placed on fileshare sites such as DocStoc.com or Slideshare.com. All of these vectors are worth checking.
Blippy.com is of the most lucrative sources of financial data because it is combined with shopping habits and expenditures (time, date, and location included). People sign up for Blippy and then allow a copy of their credit card records be sent to Blippy so they can be posted. Yes, this is real. The credit card numbers and true names on the credit cards are removed, but all of the expenditures remain, revealing what was purchased, where it was purchased, time/date of the purchase, and the prices of the items purchased. While the true names on the credit cards are removed, most people set up their Blippy accounts as they do their LinkedIn or Facebook accounts—with their real names. An account that is set up on Blippy.com, an alias or screen name can also be linked to the user's real-named social media sites, thus giving away the identity anyway. Why, you ask, would anyone sign up for such a thing? The philosophy behind Blippy is to help others get the best price available for any given item. So, if you are looking for the best Sony 42" HD TV, you could scan Blippy to see who has purchased one, where, and what the best price was for that TV. Users of Blippy have used the records of others, presented at their stores, to get the lowest price possible. Obviously, there is a high degree of disclosure by any Blippy user. First, your spending habits are revealed. Second, your shopping habits—time, date, place, etc.—are exposed. In combination with other data picked up from Twitter, Facebook, blogs, LinkedIn, potential routes to work, school, grocery stores, etc., the surveiller is now getting a much better picture of your overall habits and behavioral patterns. Over time, it may become obvious that every Saturday you are charging tickets to a baseball game or buying something from the home improvement store. At any rate, during those times, you are not home and it can be estimated with mapping apps, GPS, and online driving directions how long your commutes are and when you will be away from home.
Warning
Personal bank account amounts and line items are very difficult to attain online, unless you, the bank, or a third party has somehow exposed otherwise secured information. Some surveillers have tried illegal and unethical methods of attaining bank account information. For example, one trick is to mail a check to the target for a few dollars, calling it some type of rebate or prize. If the surveiller knows your spending habits on Blippy, the ruse of a rebate check for that new HDTV may work. When the target deposits the check, the back of the cancelled check will contain the bank routing number. From there, inquiries about the account can be made. However, it is not legal without the express permission of the account holder to disclose this information to another party. If you find yourself the recipient of a curious award, rebate, or prize, investigate the source and verify that it is real.
Acquiring financial data, and if you're so lucky as to acquire spending patterns and behavioral shopping patterns, is just the start of actually starting to track and tail a target. By now the surveiller may have your basic background data, insight into your social and familial networks, work location, basic travel routes, some financial data, and some idea of how you come and go from various locations. But now it's time to drill down on locations and travel patterns.

Frequented locations and travel patterns

As indicated earlier, sites such as Blippy provide some data regarding frequented locations and the times/dates they are visited. To add to this information, there are other ways to attain more detailed behavioral and travel patterns. Let's take a look at Foursquare.com and GoWalla.com. Both of these sites allow you to sync and link with Twitter and Facebook, but the real purpose is to announce your location. With a simple sign-in for membership and an app download, you can Foursquare your location to friends, family,…and the public. These sites were developed to provide social networking for their users but also to allow restaurants, coffee shops, and bars to be part of the Foursquare or GoWalla network. Therefore, if you are a frequent visitor to a coffee shop and that coffee shop is part of the network, the vendor may offer free coffee or snacks to the “Mayor” of the coffee shop. The Mayor is the person who frequents the shop the most and announces their presence in the store via the app. There are also other points, prizes, etc. that you can attain. While this is great advertising and marketing for the vendors, and maybe a good way to get a free beer or cup of coffee, exposing this type of data is announcing to the world that “I am not home right now. I am at the coffee shop.” In addition, when a Foursquare user's profile is visited, it has a list (much like a user's Twitter page with all of his or her Tweets) of all of the locations that have been visited. This data also comes readily equipped with time and date information. Looking at a user's profile over time, it is fairly easy to put together a behavioral pattern. We used to be told, years ago, that when the family went on vacation, “don't tell anyone.” Only one set of neighbors would know so they could water the plants and check the house. It is curious that in the current age of Amber Alerts, triple locked doors, and home security systems, people are publicly releasing such private data. But to the surveiller, this is golden.
Even if GoWalla or Foursquare are not used, a less obvious site to look into is Yelp.com. While Yelp is typically and innocently used to read and post restaurant reviews, this too can be used as additional intelligence. Yelp also posts directly to Facebook and Twitter and it can tell you when the target visits a particular restaurant. Moreover, the posted reviews by the target might reveal which restaurants he or she frequents.
Warning
There are sites dedicated to posting about those individuals who are using GoWalla and Foursquare or otherwise announcing that they are not home via Twitter or other sites. Check out http://www.robmenow.com/ and http://www.pleaserobme.com/.
While this type of data collection and surveillance may impact personal safety and security, there are cases where trolling and surveilling online can produce a target. Some of you may have clearances, classified jobs, or careers where you come in contact with very sensitive information in the form of trade secrets. Those who are interested in competitive intelligence, corporate espionage and state-sponsored intelligence gathering could employ some of these techniques—if for no other reason than to identify a good target.
Warning
During a case investigation, a woman (Jane Doe) was identified as an employee of a certain organization. Through some rudimentary searches of the name of her employer, the results showed that Jane was an avid user of Foursquare. In fact she was the Mayor of her employer's facility, dutifully checking in on her app every morning as she arrived for work around 8:15AM. Assessing her other frequented locations on Foursquare, it was determined that every Thursday she went to her favorite tavern, on Saturdays she did laundry at a local laundromat, and while the clothes were washing, she went to the sandwich shop next door to the laundroy mat. On her Foursquare account, she also listed links to Facebook and Twitter where more information was uncovered. At the end of the investigation, it was revealed that she had a security clearance, worked at a very sensitive and secured government installation, was fluent in a few languages, and did not like her job. Pictures of her and her friends were also available. Combined with her behavioral patterns of where she goes and when, she is a perfect target for foreign operatives, state-sponsored spies, or other adversaries. These adversaries basically had enough information to target her and make an approach at a variety of locations. Should this type of social networking use be assessed as part of an active clearance process? Currently, in order to obtain or update a U.S. government clearance, even though traditional background checks are still conducted, no online check is even considered.
Those of you who do not use GoWalla, Foursquare, or Twitter. to announce your locations, there are a few inadvertent ways your locations may be disclosed. Most of the apps available on Smartphones that take photos include in the meta data of the photo a GPS location and a time/date stamp. One technique of also collecting information about the travel and behavioral patterns of a target includes the analysis of posted pics. Anywhere you can find photos and images online, whether those images are on photo sites such as Flickr or Photobucket or are found through social networking sites or simply through an image search on any publicly available search engine, there is a high probability that they contain GPS and time/date stamp meta data. So even if you do not meta tag your photos with a name or label your photos on these sites, you still may be disclosing location-related data that can then be assessed for patterns. With the speed of taking the photo and uploading, for example, to Flickr or Facebook, the disclosure of additional location data could be happening in near real time. Doing an assessment of all posted photos could again line up a timeline of activities, habits, patterns, and travel that you may not want disclosed.
Warning
An assessment was conducted of a high-profile executive to determine how exposed he and his family may be online. This executive has received several death threats and was concerned about his family's safety. While the executive did have some basic background information available (i.e., home address, home phone number, alumni funds, charitable donations, some photos, including his family at a sports event, and some details on his recent divorce), it was his daughter who escalated the level of risk for him and the rest of the family. On her MySpace page was not only a blog posting which read, “Yeah, 5 more days in NYC! Staying at the XYZ Hotel—it's awesome! Dad lets me do whatever I want, so while he is at a boring meeting, I am going to hit 5th Ave shopping.” The blog included photos that verified their location in NYC and the current time and date. It appeared she was engaged in some tourist activities, took photos, and uploaded them from her phone to her accounts, so her friends could get a blow-by-blow of her exciting trip to the city. Looking further on her MySpace page and the friend's comments revealed the time, date, and location of the next sleep over as well as details about her school events.
While photo, image, and location apps can provide some good surveillance data, you cannot forget about YouTube and the other sites that allow users to post videos. It is possible that someone has already “cased” your target environment. YouTube is filled with all sorts of crazy, silly, ridiculous,…and useful videos. Much like the virtual tour a real estate agent may have posted on the home you live in now, people are easily taking video of anything and everything they see. Similar to Google street view, sometimes neighborhoods video their block parties or their drive to the dry cleaners, or kids are running around on their scooters with Smartphone video camera rolling in hand.
Warning
In some cases the target of surveillance is a place. During a red-team exercise in which the goal was to assess some of the safety and security standards in a U.S. city and conduct surveillance of the city completely from online sources, a number of interesting findings were made. One of the more interesting findings is who we refer to as “Graffiti-man.” In a series of over a dozen YouTube videos a very industrious “go-green” environmentalist packed up his backpack full of spray cans, along with a template that read, “Save the Planet, Ride Your Bike,” he jumped on his bicycle and took off to stencil his message across the city. On his bike helmet was a mounted camera in which he recorded his activities. He spray painted his message on a dozen locations across the city, including the courthouse, the sheriff's office, the public library, and other government buildings. Watching Graffiti-man's videos provides an adversary some interesting and telling intelligence. While the actual defacement activities of Graffiti-man may add up to no more than misdemeanors, his behavior and methods of operation would be valuable to an adversary. If there is a need to disperse some type of devices, canisters, or other planted items in multiple locations throughout the city following this man's pattern may represent a somewhat undetectable operation as he was never detected, even while defacing city and government buildings. Graffiti-man is an example of how to blend into the culture of the city without raising any concerns, and his camera provides valuable reconnaissance and surveillance of the city.
If you have read this far and don't use social media, social networking sites, or even log in to the Internet, you are still at risk for some surveillance techniques and data gathering. Information about you is still out there to be collected by anyone.

Third party disclosures

Remember the old Kevin Bacon Game, six degrees of separation? The goal being that if you knew one person, who knew another person, you could actually social network your way to Kevin Bacon. If the surveiller wanted to get to you, and find someone who was one or two degrees removed in order to collect additional information on you, it would take some legwork. But now with the Internet, there aren't six degrees of separation between you and anyone else but six hundred degrees of inclusion. For those of you who do not use the Internet, you don't Facebook, you don't Tweet, you don't post, you're not on LinkedIn, and you certainly don't blog, the others—the other 600 people removed from you just might.
Take, for example, an initial list of people with whom you do come in contact and who are probably Tweeting and blogging and Facebooking and Foursquaring:
• Children
• Spouses
• Significant others
• Other family members
• Friends
• Home staff (interior and exterior)
• Nannies, au pairs, babysitters
• Housekeepers and maid services
• Gardeners and lawn services
• Repair services
• Teachers, coaches
• Parents of children's friends
• Religious affiliations and leaders
• Vendors
These are the people that come in contact with you and may be posting information about you—your contact information, your life, your travels, your problems, your successes, your home, and your family—without your knowledge. Even innocent disclosures, conversations, and comments you make may end up on someone else's wall or blog. In a previous example, you saw how the executive's daughter ended up posting a lot of family and personal information on her MySpace page. So you need to consider, what is the nanny posting? Does the babysitter Tweet that she is sitting for the Jones family because the parents are out for the weekend? Does the housekeeper have access to the mail? The bills or any financial records around the house? Any of this information can end up on the Internet in the open and it does.
Warning
The CEO of a small company was having a problem with his web and email service provider. His IT staff indicated that all of the calls to the help desk for their vendor were going overseas and they were not receiving the needed assistance. One critical server was completely down and they were losing business. The vendor's HQ was in the United States, and the CEO wanted to talk to someone in the United States. So, the collection of information on the Internet commenced. First a list of U.S.-based executives off the vendor's own website was pulled together. Then the name of a likely target was chosen: the VP of customer service. And as luck would have it, he had an unusual name, so sorting through a myriad of “Bob Smiths” wouldn't be necessary. The VP did not Tweet, or blog, or even do press conferences. But, his personal cell phone number—not his work cell phone number—was found. It was found in two places. The first was on his synagogue's website as the VP is also the coach of his son's soccer team. Apparently the rabbi decided it was prudent to post the cell number of the coach so the other parents would have access if they needed to contact him. In addition to the synagogue's site, a mother of another young soccer player also posted it on her Facebook page, “If your kids are on the team, here is [named the VP] cell number. He lives down the street from me at 1052.” Searching around on her page, one of her friends posted her full address on his wall 6 months ago to let people know where her birthday party was taking place. So, with personal cell phone and home address in hand, the CEO called the VP of customer service. To say the least the VP was surprised and taken aback by the ability of anyone to get his personal number. The disclosure was by one person he knew and some other parent whom he did not know.
If someone you know isn't posting about you, maybe someone you don't know is posting. There are a number of sites that dedicate themselves to eavesdropping. Loud talkers in airports, on trains, and in restaurants are all susceptible to others listening in. Take notice next time you are on a plane, train, or even at a shopping center. People are just talking out loud on their cell phones as if they are in the privacy of their own home. They are giving out their phone numbers and credit card numbers for reservations, talking about their jobs and their accounts, and in some cases even spelling out their first and last names to operators or whoever is on the other side of the line. There are also listeners out there who take all this in and post it. Some of the interesting sites that post conversations and other comments include:
In addition to those above, there are similar sites for London, Dublin, Washington, DC, Chicago, Indianapolis, and other cities around the world.
Be careful to whom you text message and what you write in those texts. If people are interested in your conversations, they are also potentially interested in your text messages. Those who post your texts may just find them amusing or because it is easier to disperse a piece of information (like the address of the party that is hosted at your home) to a group of people who are followers of Twitter or Friends on Facebook. The site http://www.textsfromlastnight.com, for example, lists funny, embarrassing, or otherwise potentially sensitive texts. On this site, the texts can be sorted by user, area code, or keyword.

Use of signatures

Some intelligence collection jobs and surveillance jobs are more difficult than others. When the target is not readily identified, it is hard to even get a starting point. For example, you receive a threatening email but it is pretty obvious that the email address was spoofed and the headers indicated that the IP address is coming from a server that also could have been compromised. In this case, the language used in the threatening email is most useful. We are all creatures of habit and even our emails contain bits and pieces that could lead to an identification. Think about how you open your email messages. Do you say “Hi Joe” or just “Joe” or nothing at all as a greeting? How do you sign off on your emails? Do you type “Regards” or “Sincerely” or “Thanks” or “Thx”? To different people you may use different pattern. To a spouse, you may always sign off “Love” or “Love ya” or whatever your personal pattern happens to be. Likewise, we choose our words and phases and write in grammatical and syntactical styles that differ ever so slightly. It is those distinctions that are important.
Once a distinction is found, an unusual colloquialism, an odd acronym, or maybe the email contains one of those sayings people put on the signature line like “A wise man doesn't need advice and a fool won't take it.” These peculiarities are what can be identified. An investigator can put these terms and phrases into search engines and see what happens. With some luck, other instances of these phrases will appear, and with a lot of luck and persistence, the target may be found. It is not unusual that people will reuse their vernacular. They will post the same language with the same linguistic constructions in email as well as on blogs. Even professional and organized criminals have a hard time altering their natural language patterns.
Warning
This case was an investigation of a criminal network of people selling fraudulent and black market goods on the Internet. One seller in particular was of interest as he was difficult to identify except by his online handle. The goods that were being sold were also advertised and sold online. The first bit of business was to collect all of the suspect's ads and known postings. It became apparent that more than a handful of his ads contained some of the same words, same phrases, and one consistent misspelling through all of the known ads, even the ones that didn't have some of the same phrasing. An Internet search was conducted using that one misspelled word plus some key concepts from the products for sale. Five new ad pages popped up, all using another name, but in this case the name was of a known suspect. It was investigated further (using other means) and it turned out that the unknown seller was actually one of the known suspects. He changed his name and tried to hide his tactics, but he could not disguise his rhetoric.
If you do have a signature phrase (e.g., Emeril has “Bam,” Ryan Seacrest has “Seacrest Out,” and Arnold Schwarzenegger has “I'll be back), be judicious about using it online. Even if you don't post your real name, your real profile, or other identifying information, your language may identify you. It is from that initial point of identification that all of the other discussed techniques to gather information and intelligence and to conduct online surveillance can be implemented.

Automated surveillance

In the interest of keeping up with the target, there are some quasi-automated tools available. A lot of techniques can be used to collect information about you, but the surveiller also has to practice good operational security—even in the cyber world. A sloppy surveiller can get snagged by a thorough webmaster. So, it is important to consider speed, disguise, and stealth while gathering intelligence and conducting online surveillance.
While the majority of the initial data gathering may be conducted manually, once the surveiller knows what to look for and where updates are possible, a more automated collection of ongoing or updated information may be in order. Available RSS feeds or Google Alerts can alert the surveiller to additional and new information. If you are being monitored and you are a Twitter user, the surveiller may become one of your followers. Therefore, every time you Tweet, the surveiller will be notified. Likewise for other social networking sites. RSS feed aggregators can also be used to push all of the potentially relevant information to one place, which can be web based, email based, or mobile phone/Smartphone based.
Some browsers have add-ons or plug-ins that can make the searching and ongoing collection easier and faster. For example, Firefox offers a number of add-ons that allows the user to customize searches and ongoing searches without re-entering the search terms. Safari and Google Chrome also offer different flavors of RSS capability and browsing and navigation tools. Browser add-ons may also offer some specialty items that could be of interest to a surveiller. For example, one add-on for IE7 is Videoronk. This allows the user to search on eight video-sharing sites simultaneously. All of these feeds and add-ons can save time for the surveiller and make the collection more targeted and hopefully robust.
An additional concern for the surveiller, much like in the traditional sense, is the use of disguise or stealth to conduct the online intelligence collection and surveillance activities. One consideration for the surveiller is how to conduct the information collection quietly and in alias. Many different products and services can be used. The very simplest method is to conduct the searches at a neutral location—a cybercafé, a coffee shop, or a library. Do note that some of these locations require a payment for Internet access and/or have cameras on site. So hiding in plain site may not be an option. Other considerations include the use of anonymizers, encrypted Internet connections, virtual private networks, proxy servers, and IP port proxies. Other browser add-ons may also assist with achieving some level of anonymity or disguise while surfing. An add-on called Ghostery (can be downloaded for IE, Safari, Chrome, and Firefox) detects trackers, web bugs, pixels, and other types of beacons placed on web pages from Facebook, Google Analytics, and hundreds of other web publishers.
An additional consideration for the surfing surveiller is to use some form of virtual machine software or VM ware. Because of the amount of clicking, opening, searching, viewing that a surveiller has to do to collect the needed information, inevitably a virus or piece of malware will be downloaded. If this does occur, it is easier to just end the VM session and start anew rather than scrub the machine.

Target interaction

So far this chapter has focused on passive intelligence collection and surveillance. But sometimes, additional information may have to be collected directly from the source—you. Just as in the physical world, certain intelligence or surveillance operations may necessitate actual contact with the target or someone who knows the target in order to gain or verify information. Because a passive intelligence collection has already been conducted, the surveiller has all the needed information to make a swift and believable approach on the target. If you are the target, you now may be a target of social engineering, spear phishing, whale phishing, Smishing, or Vishing.
Using some of the stealth and anonymizing techniques, along with email spoofing and the information that has been collected on you, it is not too difficult for a determined surveiller to target you specifically. Let's say the surveiller wants to watch what you are doing on your computer or get access to your banking logins. In order to get that type of access the surveiller may need to drop some malware on your computer, such as a Trojan. While this type of activity is not legal, it is not beyond the realm of possibility for a head strong and unethical surveiller. The goal of the spear phish maybe to get you to click on a link and open or download a document. By knowing your background, your activities, your family names, friends' names, and work affiliations, it is quite straightforward to construct a believable and very personal email or other correspondence. Imagine that the spear phisher has found information about your home, your daughter, and your alumni affiliation. By spoofing the correct or a facsimile of a sending email address, potentially believable emails could be sent from your homeowner's association presenting new rules and regulations for the neighborhood, your daughter's school district, or your university with information from the alumni association.
Warning
It does not take a lot of hacking technical skill to spoof an email address and make it appear that the email is coming from a legitimate source. In about 5 minutes, anyone can go on YouTube and search on “Spoof Email” to find quite a number of tutorial videos to choose from.
Other techniques that could be used to target you or your family may include more direct contact. A social engineering attempt could come via phone, fax, text, instant messaging, or a knock at the front door.
Warning
Last summer, just outside of Washington, D.C., in suburban northern Virginia, a couple went away on vacation and had a house-sitter take care of the pets and plants. One afternoon, a nicely dressed young man came to the door with a clipboard and a form. The house-sitter was informed that the sanitation service in the neighborhood was under new ownership and that all the accounts would be moved to the new company as soon as the forms were completed. The nice man explained that if the house-sitter filled out the form right now there would be no delay in service and the garbage would be picked up on schedule in two days. The house-sitter politely took a form and indicated that she was in a rush and would have to do the form later. She left the copy for the couple and explained the interaction. As it turned out, the form was a fake and a scam, as an announcement came out from the local police department. Information requested on the form included name, address, SS#, and credit card information, and sadly dozens of neighbors fell for it. In this case, the neighborhood was targeted, but this social engineering attempt could have easily targeted one person or one family.
If the surveiller was able to pick up information off of Foursquare or GoWalla, or if you are in the habit of Tweeting your locations, it would also be uncomplicated for the surveiller to target you at one of your frequented locations. Armed with additional background data and intelligence, striking up a conversation or finding a reason to interact would be pretty straightforward.

Scanners and miniatures

Certainly a great deal of information can be collected over the Internet and the surveiller can remain safe and secure in comfortable location. At some point, some surveillance operations might require the use of tools, equipment, and devices, and the surveiller may actually have to get out from behind the computer to resort to more traditional techniques. Years ago, surveillance equipment was highly specialized and fairly expensive. The equipment was sometimes heavy and obvious. Fortunate investigators and those conducting surveillance as law enforcement or intelligence officer may have had the privilege of using specialized scanners and miniature devices that were tailor made for their operations. However, the average household or citizen did not have spy equipment on their person or at home. Now nearly everyone with a Smartphone has some ability to record audio and video and take photos on the spot. Do you even give a second look to an iPhone or Droid sitting on a conference room table while everyone is having a meeting? People join the meeting, sit down, put down their phones (or iPads) and start the meeting, checking their phones periodically during the meeting. But do you ever wonder if someone is using that Smartphone to record? Is anyone running an iPad app to record or transmit the conversation? Does anyone seem overly alarmed if a Smartphone is left in that conference room? A typical reaction is to ask, “Hey, is this anyone's phone?” and if there are no takers, to just put it aside until after the meeting and give it to a receptionist or office manager who can try to find the rightful owner.
Beyond carrying the built-in phone capabilities, anyone can go to the mall, an electronics store, or surf the Internet for miniatures and spy gear. Even Toys-R-Us carries spy gear toys for children, and some of the police listening devices, “special agent” night vision recording gear, and CSI kits are pretty good. The toys today are better than what was readily available to the public 10 years ago. The jewelry is actually quite impressive. Even in locations that mandate X-ray security checks or are classified as a sensitive compartmented information facility (SCIF), how many brooches, earrings, or watches are checked or suspected as anything but jewelry?
Warning
The miniature cameras and audio/video recording gear come in all shapes and forms. Use a publicly available search engine and you will find stuffed animals, jewelry, pens, coffee cups, and a host of other household and office items. Some innocent-looking office lamps are fully equipped with hours of full audio and video coverage triggered by a motion sensor, transmitting all coverage via a wireless and/or Bluetooth connection. Bug-sweeping is a bit of a lost art and practice. However, with all of the very small, benign objects that don't arouse suspicion, the practice of bug-sweeping may need to be reconsidered for sensitive areas, board rooms, offices, and meeting rooms.
Not only are the serious surveillers using the widely available miniature devices, but so are your neighbors, your children, your children's friends, etc. Remember the idea of 600 degrees of inclusion. If your neighbor is spying, your conversations may end up on the Internet. If your neighbors are very bold, you may be the star of your own YouTube video unbeknownst to you.
Wi-Fi scanners are another easily accessible tool for any wanna-be surveiller. These devices can be acquired as their own stand alone device that come in a variety of shapes and sizes including those that fit on your keychain. Otherwise, just download a scanner app on a Smartphone or iPad. What you need to be aware of is war-driving. In general, war-driving is the activity of driving around neighborhoods looking for an open Wi-Fi network. In the process of searching, the scanner does see all of the networks in the area and their names—even the ones that are secured. In some cases, open, unsecured homes are “war-chalked” meaning that their home is tagged as an available wireless hotspot. If you have never driven around a neighborhood with a scanner, it is an interesting exercise. Many people don't secure their wireless networks. Many people name their home networks with their last names, nick names, or with their address. If you are being targeted, this is another way in which a surveiller could gain information about you and your home network or take advantage of a home network if it is left unsecured.
Warning
The goal of the exercise was to identify the home addresses of as many military personnel as possible in one particular city. It made sense to start searching around the base itself. While part of the team was digging up information online, another team just drove around in neighborhoods surrounding the base where it would make sense for military personnel and their families to reside. With Wi-Fi scanners on, numerous homes were identified immediately. Home networks were named “CaptnJoe,” “2LT,” and “semperfi.” In addition to the network names, CaptnJoe and 2LT also had Army and U.S. flags hanging outside their homes. Most of the neighborhood from the artifacts and other network names seemed to house Army officers. The biggest question was how did the Marine (broadcasting “semperfi”) end up living in this predominantly Army neighborhood!

Summary and recommendations

One of the most important aspects of targeting and surveillance is to put all of the collected intelligence together. This is perhaps the more artful step in the process. Creating a working profile of the target based on open source information may lead the investigator to consider different avenues or strategies if traditional surveillance needs to be conducted next. It is very difficult not to find information on any given target. However, if the target is rich, the amount of open source intelligence can be rather astounding.
This chapter has focused on some of the techniques and methods used by online surveillers. While the information has just skimmed the surface on all of the ways to target, surveil, and compile intelligence from the Internet, it should give any online surveiller a good start. But what if you are the surveillance target? There are some precautions you can take to reduce your Internet footprint and decrease the amount of information someone could collect on you. Remember, just staying off the Internet doesn't work because your closest 600 friends, family, and strangers will continue to post information about you regardless of your participation on Twitter, Facebook, or any other social networking site.

Recommendations

Don't allow yourself or your family to become a surveillance-rich target. There are several things that you can do to create a stronger safety and security profile online. It is not wise to just never go on the Internet or use social networking sites. Using and communicating using the latest in technology is where the world is moving. But you can be vigilant and safe. Here are 10 basic recommendations:
1. Beware of real estate transactions, fund raisers, school functions, charity events. These organizations may share your personal information inadvertently or through the normal course of business without realizing the dangers. Get throwaway cell phone(s) numbers and email addresses. When you are sharing your contact information with coaches, teachers, parents, and others not in your circle of trust, provide those parties with a throw away number. If you are compromised and this number is posted to the Internet, you can simply get another throwaway phone.
2. Consider using PO box(es), your corporate address, or the address of another service provider (i.e., attorney, accountant) for bills. Since most billing is done online now, in some cases a physical address may be provided that is different from your real home address. Even if in other circumstances you have to provide a real address, when the PeopleFinds spider and compile your addresses, at least there will be some question as to which one is real. Anything to deflect or to introduce confusion provides just one more layer of privacy.
3. Purchase gift cards for use (i.e., VISA, AmEx, iTunes). Never download music, videos, or documents from P2P sites. P2P sites are notorious for malware and unless your settings are correct for each P2P network, you can risk being exposed. No one needs to illegally download free music. Most songs are 99 cents with an iTunes membership or gift card.
4. Check your wireless network at home—choose network/server names that are generic and don't contain your last name, address, or any personal identifiable information (PII). On any wireless networks, change defaults, use encryption, and name your network anonymously.
5. Children's’ participation/interaction on the Internet is age and maturity driven. However, children must understand how to use technology and social networking safely—it is critical to their developmental skills and knowledge base in the 21st century. Not allowing usage may impede academic, social, and professional success later in life. So it is very important to provide children and teens specific education on social media and social networking. There are available DVDs and training kits for children. Check out what is available from the National Center for Missing and Exploited Children and from the FBI's website. Adults may benefit from some of the materials also.
6. Never click on any link in any email, IM, or other message from someone you don't know. For all emails, use the “mouseover” test on all links. If the visible and actual don't match, don't click it. Be suspicious of anomalous communications even from a familiar email address (it could be spoofed). Use another vector of communication to validate the email, such as a phone call. Type and bookmark the sites you normally visit. Don't use links found online or in an unsolicited messages.
7. Be cautious when accepting invites on LinkedIn and other social networking sites. Review your own LinkedIn account to see if you are comfortable with everyone in your network. Ask yourself, what does your network reveal about you? Are you disclosing anything you shouldn't? In some cases, a salesperson may have a huge LinkedIn network filled mostly with their customers. But what if the customer-vendor relationship is under an NDA? The salesperson has just violated the NDA by exposing all of the customers to each other.
8. Safety lessons for using the Internet should be given the same amount of time and energy as for how to interact in the physical world. On Facebook, MySpace, and family websites, always keep you and your family disclosures to a minimum:
• No last names or identifying information
• No photos/videos (unless password protected and check for metadata if needed)
• No disclosure of age
• No disclosure of locations, visits, trips, or events. There is really no need to use sites like Foursquare and GoWalla…unless you are the surveiller.
• Set the highest level of security settings. On Facebook, this may take going through 35 to 40 settings and these settings may change periodically as Facebook updates their services. Remember, the social networking sites want you to network as much as possible. Sharing and security don't always go together and it is more important to keep yourself and your family safe.
9. Install VMware or isolate an existing computer to use for suspicious or risky actions and aggressive searching. These precautions will help you stay free of malware.
10. There is never any reason to divulge financial data. Using sites like Blippy is not necessary. If you need to find the best prices available for products, there are plenty of comparison sites to visit that post pricing for items from both retail stores and online sources.
Over time, targeting, surveillance, intelligence collection, and human behavior have not changed that much. Our tools, devices, and techniques have adapted to the available technologies of the day. But at the end of the day, a quote from Jane Austen made over 200 years ago still stands the test of time, “Every man is surrounded by a neighborhood of voluntary spies.”1
Endnote
1.
JaneAusten.org [homepage on the Internet]. [Cited 2011 June 08]. Available from: http://www.janeausten.org/jane-austen-quotes.asp
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.110.125