Home | Community | Message Board

Original Seeds Store
This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Shop: Left Coast Kratom Buy Kratom Extract   Kraken Kratom Red Vein Kratom   North Spore North Spore Mushroom Grow Kits & Cultivation Supplies   PhytoExtractum Buy Bali Kratom Powder   OlympusMyco.com Olympus Myco Bulk Substrate   Myyco.com Isolated Cubensis Liquid Culture For Sale   Unfolding Nature Unfolding Nature: Being in the Implicate Order   Bridgetown Botanicals Bridgetown Botanicals   MagicBag.co All-In-One Bags That Don't Suck

Jump to first unread post Pages: 1
Offlineshivas.wisdom
בּ
 User Gallery

Folding@home Statistics
Registered: 02/19/09
Posts: 13,487
Loc: Turtle Island
Last seen: 9 hours, 21 minutes
Never turn off the phone: A new approach to security culture
    #25614982 - 11/14/18 05:46 PM (5 years, 6 months ago)

In the 80s, an anarchist who wanted, for example, to burn some building, developed his/her plan and at the same time looked to see if there were no listening devices in his/her house. In the late 90s, the same anarchist turned off the phone and used encrypted traffic on the Internet. In the 2020s, we need to reconsider our strategy, intelligence gathering has improved and we must also take this into account.

To begin with, let’s see how big data analysis is used. To do this, we need to talk about 3 things: metadata, templates and networks. It seems boring and difficult, but I am not a technician, and I will not bore you with technical language, I will make it as simple as possible.

Metadata: In the context of online activity, “content” means “the message you sent”, and “metadata” means “everything except the content”. So, for example, if you send a text about lunch to your friend, the content may be “Let’s go on lunch”, and the metadata may be “Message sent 01/04/2018 11.32 from 0478239055 to 079726823 using Signal”.

This information is recorded by your phone, even if the application encrypts your actual message. Your metadata is very poorly protected by technology and very poorly protected by law. No matter what country you are in, the majority of your metadata is freely available to special services, regardless of whether you are suspected of something.

Templates: Whether you realize this or not, your metadata has a template. If you have daily work, you can have a very consistent pattern, if there is no such work, your template may be more flexible, but you have a template. If someone wants to know the rhythm of your day, they can do it very easily, because your template is in metadata.

For example: Maybe you use Wi-Fi in your favorite bar on most Sunday nights until midnight, you wake up around 10 am and check your Signal, you use your public transport card to get to class every Monday afternoon, and you spend an average of 1 hour per tumblr twice a day. All this is part of your template.

Network: You have an online network. Your friends on facebook, the people in your phone’s address book, the dropbox you are sharing with your colleagues, everyone who bought online tickets for the same punk band that you attended, people using the same WiFi points as you. Take your networks, combine them with the networks of other people, and the clusters will manifest themselves. Your working community, your family, your activist scene, etc.

If you are in the anarchist community, it is likely to be quite obvious from all of your small network connections, such as visiting one band and knowing the same people as other anarchists. Even if you have never clicked on an anarchist facebook page or didn’t click the go button on the anarchist facebook event, your network is hard to hide.

Now, let’s say you committed a crime, one that would lead to a serious investigation.

Suppose that on Sunday at 3 am, you and your friends go out and burn the house of the Nazis. (Of course, I would never advise any of you to do something like this.) Obviously, the anarchists did, but there are no other clues. You are using a traditional safety culture: you burn records, you try not to communicate your plans near technology and you leave no physical traces.

But since you committed a crime that night, your metadata will be very different from your usual rhythm: you stay in your usual bar until 2 am to wait for your friends, you will not wake up at 10 am and check your Signal or you will Tumblr only in for an hour of the day. You do not go to class. Your metadata template is very different from your regular template. Your friends metadata models are different too. If one of you is clumsy, they can generate a super suspicious metadata signal, for example, the phone turns off at 2.30 at night and is activated at 4 am. You are not the first here.

If I wanted to solve this crime using data analysis, then I would do the following:

• allow a piece of software to analyze the patterns of the local anarchist scene to identify the 300 people most associated with the anarchic scene;

• allow the second piece of software to analyze the metadata samples of these 300 people in recent months and identify the biggest metadata changes on Sunday evening, as well as any very suspicious metadata activity;

• Exclude variations of the pattern with an obvious reason or an obvious alibi (people who are on vacation, people who are in the hospital, people who have lost their job, etc.);

• Would conduct a more in-depth study of those who remained.

That’s right, from the huge number of people I could not listen to at the same time, I can quickly identify a few in order to closely monitor them. So I could find and catch you.

And now what?

If a traditional safety culture will not protect us as before, how do we adapt? Well, I have no answers, but for a start I would say: know your network + know your template.

In the case of the example above: leave the bar at midnight, go back home and put the phone on the bedside table. Check the apps you usually check before bedtime and set the alarm for 10 am. Return to the bar without a phone. Wake up at 10 in the morning and check your Signal. Drag yourself to class or ask a friend to travel with your travel card and do not use technology in your home while a friend travels with your travel card to class. Stick to your template. Never turn off the phone.

You can also manipulate your network, but it is much more difficult to do. Do not use the smartphone in general and abandon all social activity on the Internet – this requires serious motivation. Knowing your data template and making sure that it looks ordinary is much easier.

Some of the old rules will still apply: do not talk about crime around devices with microphones, do not brag after successful actions, etc. Other rules, such as “turning off the phone when planning illegal actions”, need to be changed because their metadata looks too unusual. No one else disconnects your phone. We look suspicious when we do this.

This is just one idea on how we could update our safety culture. Perhaps there are other people with different, better ideas about updating our safety culture. If we start a conversation, we can get somewhere.

Finally: we need to continue to adapt

As technology changes, more information emerges, including data that we have very little control over. Smart-TV and advertising in public places that listen to every word that we speak, and the tone of our voice when we speak, these are examples. Currently, data analysis projects use license plate reading software to compare vehicle traffic patterns. It says a lot that they may soon be ready to do the same with facial recognition, after which the presence of our face in the public space will become part of our metadata. Additional information means more accurate data analysis. Our metadata may soon be too extensive, which is too difficult to fully reflect and mirror. This means that we will need to adapt our counter measures if we want to hide something.

How do we keep all this under the radar? I don’t know. But let’s try to understand this shit. These are some first thoughts on how a safety culture should look like in an era of modern analysis of large data sets, and I would be very happy to receive additions from comrades who have thoughts on this.

Also, feel free to distribute and redo this text without references.


--------------------

Extras: Filter Print Post Top
Invisiblepablokabute
Hari ng Amag
 User Gallery


Registered: 11/22/11
Posts: 5,187
Loc: rural ghetto
Re: Never turn off the phone: A new approach to security culture [Re: shivas.wisdom]
    #25615012 - 11/14/18 06:00 PM (5 years, 6 months ago)

thank you for the analysis...

im a self declared anarchist and a shaivite buddhisr punk.


--------------------

Fermented Mushrooms!!
--- https://www.shroomery.org/forums/showflat.php/Number/23378638/fpart/1/vc/1

'The second seal: “All CONTAMINATED things and events are unsatisfactory.”'



"I envy you. You North Americans are very lucky. You are fighting the most important fight of all - you live in THE HEART OF THE BEAST."

--Anonymous Guerilla, or is he..

Extras: Filter Print Post Top
Invisiblepablokabute
Hari ng Amag
 User Gallery


Registered: 11/22/11
Posts: 5,187
Loc: rural ghetto
Re: Never turn off the phone: A new approach to security culture [Re: pablokabute]
    #25615013 - 11/14/18 06:01 PM (5 years, 6 months ago)

so hello there, comrade.


--------------------

Fermented Mushrooms!!
--- https://www.shroomery.org/forums/showflat.php/Number/23378638/fpart/1/vc/1

'The second seal: “All CONTAMINATED things and events are unsatisfactory.”'



"I envy you. You North Americans are very lucky. You are fighting the most important fight of all - you live in THE HEART OF THE BEAST."

--Anonymous Guerilla, or is he..

Extras: Filter Print Post Top
Offlineshivas.wisdom
בּ
 User Gallery

Folding@home Statistics
Registered: 02/19/09
Posts: 13,487
Loc: Turtle Island
Last seen: 9 hours, 21 minutes
Re: Never turn off the phone: A new approach to security culture [Re: pablokabute]
    #25615119 - 11/14/18 06:53 PM (5 years, 6 months ago)

Hah! Yeah I think we'd get along great. How did you end up going down that path?


--------------------

Extras: Filter Print Post Top
Invisiblepablokabute
Hari ng Amag
 User Gallery


Registered: 11/22/11
Posts: 5,187
Loc: rural ghetto
Re: Never turn off the phone: A new approach to security culture [Re: shivas.wisdom]
    #25615264 - 11/14/18 08:17 PM (5 years, 6 months ago)

Quote:

shivas.wisdom said:
Hah! Yeah I think we'd get along great. How did you end up going down that path?





Im leaning more towards self-sustaining Permaculture anarchy.. loved the punk ideals, Buddhism and also follow lord Shiva.. :smile: chanting Shiva's name also give me strength and a sense of purpose and a sense of fearlessness in everything that I do.

how bout you sir?


--------------------

Fermented Mushrooms!!
--- https://www.shroomery.org/forums/showflat.php/Number/23378638/fpart/1/vc/1

'The second seal: “All CONTAMINATED things and events are unsatisfactory.”'



"I envy you. You North Americans are very lucky. You are fighting the most important fight of all - you live in THE HEART OF THE BEAST."

--Anonymous Guerilla, or is he..

Extras: Filter Print Post Top
Invisiblepablokabute
Hari ng Amag
 User Gallery


Registered: 11/22/11
Posts: 5,187
Loc: rural ghetto
Re: Never turn off the phone: A new approach to security culture [Re: pablokabute]
    #25615266 - 11/14/18 08:18 PM (5 years, 6 months ago)

Om namah Shivaya
Bum Shiva
Hara Hara Ganga


--------------------

Fermented Mushrooms!!
--- https://www.shroomery.org/forums/showflat.php/Number/23378638/fpart/1/vc/1

'The second seal: “All CONTAMINATED things and events are unsatisfactory.”'



"I envy you. You North Americans are very lucky. You are fighting the most important fight of all - you live in THE HEART OF THE BEAST."

--Anonymous Guerilla, or is he..

Extras: Filter Print Post Top
Invisiblefilthyknees
no coincidence
 User Gallery

Registered: 03/08/13
Posts: 6,283
Re: Never turn off the phone: A new approach to security culture [Re: pablokabute]
    #25624973 - 11/19/18 10:08 AM (5 years, 5 months ago)

Cool post


--------------------
But if you're in a hurry, and really got to go
If you're in a hurry, might have to find out slow
That it's one thing to try and another to fly
You get there quicker just a step at a time
It's one thing to bark, another to bite
The show ain't over till you pack up at night

Extras: Filter Print Post Top
OfflineAlan RockefellerM
Mycologist
Male User Gallery
Registered: 03/10/07
Posts: 48,392
Last seen: 2 days, 22 hours
Re: Never turn off the phone: A new approach to security culture [Re: shivas.wisdom]
    #25625687 - 11/19/18 04:02 PM (5 years, 5 months ago)

Interesting idea, but also sounds kind of paranoid.  I don't think this is how they solve crimes now.  Maybe in 10 or 20 years it will be.

Extras: Filter Print Post Top
Offlineshivas.wisdom
בּ
 User Gallery

Folding@home Statistics
Registered: 02/19/09
Posts: 13,487
Loc: Turtle Island
Last seen: 9 hours, 21 minutes
Re: Never turn off the phone: A new approach to security culture [Re: Alan Rockefeller]
    #25626190 - 11/19/18 07:33 PM (5 years, 5 months ago)

It's better to be proactive than reactive, but this is definitely just the beginning of a conversation over how security culture may have to change in response to new technologies.

You're probably right that this is still a decade or so in the future, at least in widespread application; but I think that considering how some innocuous actions (like environmental activism) are considered serious domestic terror threats and handled accordingly by federal agents, our developing technological footprint is important to discuss, because it could be used against us today.

We're probably safe if we're only growing mushrooms though.


--------------------

Extras: Filter Print Post Top
Jump to top Pages: 1

Shop: Left Coast Kratom Buy Kratom Extract   Kraken Kratom Red Vein Kratom   North Spore North Spore Mushroom Grow Kits & Cultivation Supplies   PhytoExtractum Buy Bali Kratom Powder   OlympusMyco.com Olympus Myco Bulk Substrate   Myyco.com Isolated Cubensis Liquid Culture For Sale   Unfolding Nature Unfolding Nature: Being in the Implicate Order   Bridgetown Botanicals Bridgetown Botanicals   MagicBag.co All-In-One Bags That Don't Suck


Similar ThreadsPosterViewsRepliesLast post
* The BASICS of Securing your computer and E-mail. Cyber 2,691 12 06/09/09 03:34 PM
by Alan Rockefeller
* Metadata jonsnow 379 4 08/18/13 10:32 PM
by Bacchus
* I Smell BS, Cell Phone Recordings
( 1 2 all )
Twirling 3,553 32 12/28/04 01:17 AM
by zachwass2000
* how good are cell phone taps? thegnomeking 1,425 4 08/03/04 11:42 PM
by Prisoner#1
* Sites to temporarily save photos that are stripped of metadata Anonymous 369 6 02/02/15 06:54 AM
by Anonymous
* Security tips that EVERYONE should read twice!
( 1 2 all )
daba 25,421 22 05/02/06 08:56 PM
by Pashasan
* Phone Tappings
( 1 2 all )
tom 6,290 21 11/11/02 01:48 AM
by PsiloSteve
* ****BROADBAND PHONES*** onetime 1,644 14 03/26/04 01:53 PM
by phi1618

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: Enlil, Alan Rockefeller
950 topic views. 0 members, 0 guests and 2 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.023 seconds spending 0.007 seconds on 15 queries.