<Previous
Next>
The Law of Unintended Consequences
“Give him enough rope and he'll hang himself.” That is a line often directed
toward someone who is engaging in nefarious activities without realizing he is being
monitored and abetted in seeing to it that he orchestrates his own downfall. Sometimes,
though, well-meaning folks unwittingly are accomplices to their own adversity. If
you are an engineer, technician, manager, or salesman who has participated in the
development and/or deployment of wireless technology, you may have already set the
stage for your personal waterloo.
You know you are being watched, right? Constantly, right? Cameras in bank lobbies
and clothing stores have been around seemingly forever to record archival data in
case it is needed later in the pursuit and/or prosecution of a perp. Technology
evolution then gave us more ubiquitous wireless video surveillance that performs
24/7 sentry duty in the Wal-Mart parking lot, on schoolyard playgrounds, at busy
road intersections, and in high crime areas of urban neighborhoods. We hardly noticed
its evolution, mainly because viewing of the records was limited largely to those
responsible for security.
Then, along came the Internet and all restraints for invasion of privacy were
removed. Take a walk along the beach, stroll downtown on the sidewalk past the bakery
or pizzeria, cruise an interstate highway through a metropolitan area, withdraw
money from an ATM, or even go to the zoo, and there is a good chance that somebody
will (or at least could) see you in real time while sitting in front of a computer.
More than a few people have been unpleasantly surprised to find videos or still
shots of themselves turn up on websites like YouTube. There is nowhere to hide,
it seems, if you are to go about your life in a “normal” manner. There could easily
be dozens or hundreds of images recorded of you in your travels - anywhere in the
world. Far from being merely the contrived imagination of a helpless paranoid, this
is a very real phenomenon.
It gets worse. RFID and other wireless reporting systems now make not only seeing
you, but tracking your movements and habits even simpler. I have linked to many
headlines over the years that tell the story of criminals being tracked down and
apprehended through the assimilation of data from recording and tracking devices
spread over sometimes very wide regions. With relatively little effort, law enforcement
can subpoena camera and electronic recordings from any and all sources that lie
within an area of interest. Agents can utilize the cellular telephone networks and
lately WiFi nets to track your path from point to point if you are using those services
while on the move. That GPS receiver in your phone or laptop is especially appreciated
because it provides much greater precision than does triangulation off of multiple
cell towers or access points (there is more to the mandate for E911 than just finding
you if you've fallen and you can't get up). Keep in mind that your cell phone is
in nearly constant communication with the network even when you are not talking
with someone - it just needs to be turned on. Zipping through the E-ZPass toll booths
provides not only a simple digital record of your having been there, but a snapshot
of you as well just in case it is needed later - remember to smile on the way through.
You are not a criminal, though, so you have nothing to worry about. Don't be
so sure. The OnStar system in GM vehicles has provided unwelcome evidence in more
than one civil court action. Wives have hired lawyers who have obtained subpoenas
to obtain information on the whereabouts of their cheating husbands at clubs, motels,
or other places they should not have been. Husbands have taken the same action against
their wives. Guess what? Your cell phone can provide a lot of the same information
- dates, times, and locations (at least from which cell area). The standard computer
in your car is constantly filling a buffer with information about your driving speed,
acceleration, and braking. Police accident investigators routinely do a data dump
at the scene for information that can and will be used in court against you (or
in your favor if you are lucky). Credit card swipes, which all feed back into a
central collection database, are prime targets for use in mounting a prosecution
against you.
Are you worried yet? Have you done something that now you are a little concerned
that somebody, somewhere has recorded it, but at least so far has no reason to use
it against you? Have you been to any "questionable" websites lately, or maybe on
a regular basis? Do you use an online alias under the erroneous assumption that
no one really knows who you are? Don't count on it. Do you post anonymously on forums
and blogs, or do a little bit of online gambling, all the while being confident
that it is just your little secret? Unless you are a true black hat operator, you
are not fooling anyone. Your tracks are sitting on your computer, in worldwide web
routers, in your employer's nightly tape backup, maybe on your flash drive, and
any number of other places. Maybe it's time to do a total system restore with a
hard drive format, but even that can be "undone" if investigators know what they
are searching for. Maybe you should just buy a new computer and trash the old one;
that way all traces are gone - like melting down the murder weapon.
Now we have people volunteering to have RFID chips implanted, similar to the
ones the animal shelter injects into adopted cats and dogs. In February of this
year (2008), a New Jersey policeman became the first reported case of a person being
saved due to having an RFID tag implant with his medical history in it. Given enough
time, maybe through force as a part being eligible for treatment under the seemingly
inevitable socialized health care system that is coming to America (and already
implemented in most other countries), we might all be sporting an RFID chip. Operational
ranges for the devices are increasing all the time so that a near field scan will
no longer be necessary. That means setting up monitoring points as an integral part
of store checkout lines, taxi cab meters, bus and train portals, vending machines,
parking meters, and bathrooms, not to mention the other locations previously mentioned.
The difference is that now you can personally be associated with buying those cigarettes
even though you use cash, or maybe it will be a couple Snickers bars when you are
a diagnosed diabetic. Wait until your government-assigned physician learns about
that! Undergoing therapy for a gambling addiction and trying to buy a lottery ticket
or a deck of cards? You're busted! Trying to buy more gasoline than your personal
carbon footprint quota allows for? You're busted!
Who can you blame for what exists now and what is being developed for the future?
Why, maybe that trite old saying about three fingers pointing back at yourself when
pointing the index finger at someone else really does have some merit. After all,
as I stated in the beginning, if you have in any way helped to develop or deploy
the technology, you have essentially given up your right to abstain from self-incrimination
in a court of law. Nice going.
That Cell Phone In Your Hand Is A Tracking Device
Chips: High-Tech Aids or Tools for Big Brother?
Lawyers
Using E-ZPass to Expose Adulterous Spouses
New Jersey Motorcycle Officer Loses Leg Following Crash
Posted March 6, 2008
|