Avoiding the eye
Avoiding the eye
THE EYE
IMMEDIATELY STOP THE PURSUIT TO
COLLECT YOUR DATA AND CONTROL
YOUR WORLD
RICHARD MARSHALL
INTRODUCTION
It was just another night in Columbus, Ohio. Teresa Clark and her
boyfriend were snuggling in their bed, watching Netflix on the laptop.
Nothing was unusual... Until Clark logged into Facebook the next
day and found intimate images of herself and her boyfriend from the
night before, posted by an unknown person. The person, identified
as Mahmoud Abdul in Cairo, Egypt, uploaded the pictures with a
caption “Really, cute couple [sic]”. The pictures were apparently
taken from the laptop’s webcam.
These stories are becoming more common. This past March, a young
man turned himself into the FBI and was sentenced to 18 months
in federal prison for hacking the computer of Miss Teen USA,
Cassidy Wolf. He watched her through her computer’s webcam for
months, and took intimate photos of her in her own bedroom. He then
attempted to blackmail her, asking for money in return for not posting
the videos and photos.
Do you ever get that strange feeling that you’re being watched? I sure
do.
The scary thing is, you are probably right – you ARE being watched...
Government agencies track our activities and collect our information
without our consent each day.
Government agencies like the CIA and NSA have the technology
to track your every move. Not only do they have it, they use it to
its fullest extent. You won’t know it, but they are carrying out
surveillance activities 24/7. The resources at their disposal and the
techniques they employ make them a top concern, as they can breach
any individual’s privacy at any given time.
It is not difficult for NSA and CIA (not to mention criminals and
hackers) to spy on us. Between smart technology, social media, and
holes in the security of our devices, we are pretty exposed.
If you post on social media, anyone can peek at your everyday life
through your social media account. Any time you purchase products
online, you create a record of it by leaving your personal information,
including your address, current phone number and credit card data,
as well as usernames and passwords. By tracking this information,
the government can know where you live, what credit cards you are
using, what you are buying and when you were last online.
Your smart devices are not safe as you think they are. Webcams and
microphones embedded in your device may be used by the government
to tap into your everyday conversations. The government can monitor
any suspicious activity through what you say and even write on social
media or anywhere else on the Internet.
We will talk about the deep web and the activities it is used for.
Lastly, I will share precautions and steps you can take to avoid the
prying eyes of Big Brother.
TABLE OF CONTENTS
HTTPS Everywhere 40
• An alternative? 41
Encrypt your emails and browser 41
Encrypt communications as much as possible 43
VPNs are great for browsing 44
Go offline on a separate device 45
Two-Factor Identification 45
I
ntelligence activities have been carried out by the US since the
days of George Washington. These intelligence activities became
more streamlined under the supervision of the government after
the Second World War.
The CIA was officially and technically given the role of coordinating
the intelligence activities across the country, correlating, evaluating
1
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
There is no way for the average Joe to gauge the extent of tracking
and surveillance of citizens that the CIA is doing in the US, other than
what little information is available on the web and what the media
tells us each day.
This means that whatever you may be doing, you cannot escape the
clutches of Big Brother.
2
CHAPTER 2
T
he media is filled with subtle examples of the surveillance
and tracking the government does. If you’ve ever seen the hit
television series Chuck, you would’ve had some laughs. But
a breach of privacy is no laughing matter. If you watch between the
scenes, you can see an elaborate, although comical, representation of
how the government surveillance is done.
3
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Other than that, the government can spy on you through your
everyday spending. From the time you wake up and have the morning
coffee at Starbucks, to the time you go for groceries at Walmart, the
government has a record of what you spend, where and when.
The NSA collects countless phone calls, texts and emails on a daily
basis to monitor any suspicious or terrorist activity. That includes
your communication with clients and with your family. Although it’s
not part of the NSA’s duties to spy on US citizens, it still does that.
What the future holds is clear. With the rapid pace of technological
innovation (think RFID chips), the government’s bound to do more
surveillance. DNA and lab tests for DUI and other criminal charges
are already commonplace and we’re gradually brainwashed to let
go of more and more aspects of our privacy and accept the invasion
of our personal lives as the norm. Our private information is being
shared freely by companies that we buy from, police officials have
cameras attached to their uniform and will soon have handheld
devices capable of sending iris, face, fingerprint and even DNA scans
4
Chapter 2: Big Brother’s “Watching You” at All Times
There are thousands of cars right now that have been fitted with GPS
tracking devices without the knowledge of the owner, to allow the
FBI to track these individuals. These devices cannot be installed in
a car without a warrant for probable cause being issued. Yet they are
being installed.
All these activities and measures show that no matter where you are
in the US, you cannot escape the Big Brother’s eyes, ears and worst
of all, their grasp, if they decide to target you. There were many
people who tried to expose the system, but one man stands out in
particular. That man is Edward Snowden.
5
CHAPTER 3
Edward Snowden
E
veryone’s heard about Edward Snowden. He was allegedly
responsible for leaking highly confidential information about
many security organizations like the CIA, NSA, as well as the
British and Australian Intelligence, to the public.
Snowden’s life took an unexpected turn when had to quit high school
after being diagnosed with mono in 10th grade. When he got better,
he headed straight for the local community college. This was where
his interest in computers and technology took roots.
He joined the US Army Reserve in 2004 but broke both legs during
special forces training and had to leave service.
6
Chapter 3: Edward Snowden
The CIA saw his potential and posted him to Geneva to maintain
computer network security in 2007. He was also considered to be the
top technical and cyber security expert while he was there. In 2008,
he was even hired to support the President at the NATO Summit in
Romania as one of his diplomats.
In 2009, when Snowden left the CIA and Geneva, his supervisor
wrote in his file that there was a change in Snowden’s behavior and
work habits. The CIA became increasingly suspicious of Snowden,
saying that he was trying to gain unauthorized access to classified
computer files.
7
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Blarney etc.
8
Chapter 3: Edward Snowden
Guilty Conscience
Snowden could not bear the CIA deceiving the American public. He
began to question the agency’s ethics. While undercover with the
NSA in 2009, he was disturbed when he witnessed junior officials
sharing people’s most sensitive data with their fellow operatives,
which was an infringement of the individuals’ privacy. The sensitive
data included private videos and photos that would be considered
embarrassing if revealed publicly.
9
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Edward Snowden was just one of the people trying to expose the
government surveillance programs. Another popular source of trusted
information on the Internet is “Wiki Leaks”. It has been labeled as a
‘go-to’ source of information for exposing government officials and
organizations and their hidden agendas, among other things.
Let’s find out a little bit more about Wiki Leaks, the secrets it has
exposed, its motivations and the man behind it.
10
CHAPTER 4
T
he US government is riddled with conspiracies and leaks,
and many of them are proven to be true. One instance is of
Deep Throat, an informant of the government who told about
the Watergate Scandal, that sank the presidency of Richard Nixon.
After 3 decades, Deep Throat was revealed to be former FBI deputy
Director Mark Felt.
11
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
For the last 11 years, Wiki Leaks has claimed to have released around
12
Chapter 4: Wiki Leaks and the Man behind it
In the very early years of Wiki leaks, Assange gave lectures and
interviews around the world, portraying himself as the founder of
the site. If you’ve watched the movie “the 5th Estate”, Benedict
Cumberbatch plays the leading role of Assange.
Assange has had allegations of rape against him in Sweden in the past.
13
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
The timing of the emails that cost the DNC dearly in 2016 were timed
perfectly by Wiki Leaks. Over 19000 emails and 8000 attachments
were leaked onto Wiki Leaks and showed DNC’s hidden agenda to
sabotage Bernie Sanders’ campaign.
This would show that the motivations of the website are anything
but pure. Wiki Leaks is like another media outlet and has editorial
procedures. Julian Assange professed to being against the US Global
14
Chapter 4: Wiki Leaks and the Man behind it
15
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
A Common Misconception
Despite the similarity in the name of Wikipedia and Wiki Leaks, there
is no link between the two. Both these organizations and websites are
separate. The organization started out as a “Wiki” Page but abandoned
the idea in 2010, when they set up the website separately.
16
Chapter 4: Wiki Leaks and the Man behind it
Wiki Leaks has also released some greatly disturbing videos in the
past. For example, there’s a video that shows a scene during the Iraq
war, where an American Apache (helicopter) was shown killing two
of Reuter’s journalists.
That’s where the Deep Web comes in. The Wiki Leaks “underground”
fundraiser happened through the Deep Web. But what is the Deep
Web?
17
CHAPTER 5
Y
ou have probably heard that the Internet we use is only 10%
of the actual Internet. Think of it as an iceberg with only its
tip above water.
That’s known as the surface web. All the activities that we carry out
online, from online shopping to using social media, are done on the
surface web.
We also use the surface web for watching and downloading videos,
pictures and music, surfing for entertainment or work, applying
for jobs and much more. But there’s still a lot that is hidden and
unexplored on the web – a whopping 90% of it is not indexed by
regular search engines.
18
Chapter 5: The “Deep” Web
https forms.
The Hidden web has a number of uses. These range from encrypted
mail, secure online banking and pay as you go services (such as video
on demand and magazine/newspaper subscriptions), to a lot more
sinister goings-on.
The reason behind the Deep Web’s notorious reputation is that it’s
where all the suspicious activities happen. From buying and selling of
illegal drugs and weapons, to hiring assassins and gaining access to
stolen credit cards. There are loads of creepy and nasty activities
happening in the Deep Web, the thought of which would make the
best of us shudder.
Since the Deep Web allows users’ identities to remain hidden there
are many hackers and criminals who use it to carry out their illegal
activities to escape the clutches of government and law-enforcement
agencies.
Similarly, there are journalists and government agents who use the
19
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
These web pages, and billions of additional ones, are not accessible
by conventional search engines such as Google, Yahoo! or Bing.
They’re accessible to people only when they use a specific browser
called TOR using “.onion” instead of “.com”. Many links are under
the “onion” domain name.
You can’t visit all of the pages
on the regular Internet, let alone
the deep web. There’s not enough
time in the world... The Deep web
is completely separate from the
surface web. Of course you’ll be
using the Internet provider you
normally use and the same old
laptop you use. The only difference
will be that it won’t just be the
regular Internet anymore.
20
Chapter 5: The “Deep” Web
The IDs of people who have died can be reused by criminals or those
evading the law. They can assume the identity of the deceased, if
needed, on the deep web.
The Deep web is a den for hackers, too! Criminals employ the services
of hackers if they need to breach security protocols of selected
21
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
websites. These hackers can make their way into secure websites to
siphon off sensitive data including customer profiles, bank account
details and so on. Someone could potentially hack into the federal
reserve and empty out the bank if they wanted to – all with the help
of hackers.
Criminals also use the deep web to hire skilled assassins and to trade
drugs and weapons. Prostitution rings, sex trafficking groups and
human organ traders operate on the deep web.
The deep web is also frequently used by the media around the world.
Journalists are not allowed to expose the truth if it conflicts with state
or political interests in certain countries; they often use the deep web
anonymously to both find and disseminate the truth that matters,
while protecting their identities. The deep web is also used to bypass
censorship laws in China and the Middle East.
22
Chapter 5: The “Deep” Web
the deep web. Today, Bitcoin gained popularity outside of the deep
web and some people even consider it the strongest currency in the
world due to its security and safety. It has also emerged as a great
investment tool in recent years, prompting deep web users to shift
towards a different currency.
Most deep web transactions are now done in Coin base, which works
much like any other crypto- currency, but Bitcoin and Ether (recently
included in the list of currencies to carry out deep web transactions),
remain quite popular.
23
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
It wasn’t always like this. The Onion Router was made by a non-
profit group but is now under the control of the government. The
government made its way into TOR to some extent and later took
24
Chapter 5: The “Deep” Web
25
CHAPTER 6
S
mart devices have come a long way in recent years.
Smartphones now boast dual cameras, 360° field of vision and
4G connectivity. You can pass files from one phone to another
simply by touching the phones. You can connect your phone to a
number of smart home devices and get remote camera feeds from
inside your house, start and stop appliances, turn off the lights, lock
the doors and open your garage --- even if you are on the other side
of the world!
But the fact of the matter remains that these devices are a portal from
your device to the government surveillance networks and databases.
The camera built into your laptop and the smart home accessories you
have placed all around your house are easy targets for the government
to spy on you.
26
Chapter 6: Your devices track every one of your moves
The home monitor that you just purchased for your house knows
exactly how many people are in your house at any time and where
they are. The smart water meter you bought to monitor your water
consumption to help you be more energy efficient knows every time
you visit the bathroom to do your business.
Smart Alarm clocks can identify your sleeping and waking times and
your smart fridge knows every time you open and close it or draw a
glass of cold water. Many similar devices for your home and health
tracking can also send your information to the government officials.
All this information is used to create a very comprehensive database
of individuals with the government.
But do you realize what permissions are you giving them? You allow
27
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
How?
If your mobile application
can use your GPS, it can track
wherever you are, as most
Americans always carry their
phones on their person. But
the permission for the app to
use your GPS is already there
so it can track you even if
there is no indication that the
GPS is on. The same is true
for any other feature, such as
cameras and microphones.
iPhones and Android devices that have voice enabled commands can
help the government tap into your microphones and listen in on your
conversations, during a phone call, or in general. SIRI (iPhone) and
other voice activated assistants like Google voice Amazon’s Echo
record every time you say something to them.
It’s the way these assistants have been programmed. They track your
searches so that more relevant ads are displayed to you. It also helps
28
Chapter 6: Your devices track every one of your moves
them improve search features. You can play back your voice searches
to know exactly what you searched for in the past. This helps you
monitor yourself. The government can monitor you as well, if it gains
access to your device, which isn’t all that hard to do.
Apple argues that the data it collects from GPS tracking services
is used to learn about places that are most important to you to give
improved suggestions to you. They also guarantee that the data is
stored on your phone, locally, that it cannot be accessed by anyone
else, nor is it shared with anyone else. Your phone knows what you’ve
done over the course of the past month -- from where you’ve shopped
and how much you’ve spent, where you work, where you go for a
drink with your buddies, and what other addresses you frequent.
For Apple, you can search for frequent locations that you’ve visited
on System services in settings.
When you look at the history
section, you can see that the
iPhone you trust, has a record
of the 5 broad areas that you
have visited in the past month
or even two. Clicking on one
of the 5 locations, you’ll see
that a map opens up and shows
blue circles for the general
areas where you spent most of
your time.
29
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
The government officials can easily figure out your habits using
this information. Some of the younger officials in government
organizations can unnecessarily share your personal pictures or videos
with their colleagues, without even having that incident reported.
Your Smart TV
Smart TVs have become all the rage nowadays. They connect you to
the Internet and have unmatched features that help you get more from
your TV. You can read blog posts, watch videos, look at pictures, buy
products and post on social media.
30
Chapter 6: Your devices track every one of your moves
gesture devices like the Xbox Kinect and speech recognition. The
speech recognition allows you to control your Smart TV using your
voice just as you control your iPhone using Siri. You can even buy
your favorite apps, games movies and TV shows using your remote
control, Tablet, laptop or smartphone.
What the advertisers of Smart TVs don’t tell you is that your smart
TV can be used by the government to track your viewership habits.
Government officials know which games you play, which movies and
TV shows you watch and how much time you spend on particular
sites.
When you buy a Smart TV, you normally don’t wait to start browsing
the web. You just want to explore the tons of features that it offers.
Who has the time to start reading through the license and service
agreements that show up when you startup your smart TV for the first
time?
If you’re like most people, you just click “I agree” and get to the fun
stuff. Well, next time you may want to read through the agreement
because, buried somewhere in the tiny lines of text is a clause that
allows your Smart TV to track your viewing habits – with your
permission! It also explains that you are giving express permission to
share your viewing habits with third parties, such as advertisers (and
even the government -you never know).
Example:
One of the manufacturers of smart TVs, Vizio, was fined a $2.2
million fine by the FTC for not properly disclosing how it can share
and track its users’ information. Vizio has been tracking whatever
31
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Samsung and LG have faced similar scrutiny in the past. This shows
that manufacturers also have to be careful in disclosing the entirety of
the methods used for tracking information.
Data connected cars know a lot about you, including your driving
style, how far you travel every day, how much emergency braking
you do each day, your average speed and even when you tend to
accelerate. New systems in smart cars can track traffic violations,
mobile phone use and more.
32
Chapter 6: Your devices track every one of your moves
data.
The consumers’ data is theirs to share with third parties, but these days,
as smart devices collect more and more data, consumers seem to be
the last to find out who gets access to it. At the very least, we should
know what data is being collected and who it’s being shared with. As
consumers, we do have a right to privacy and the data collected and
potentially sold by auto manufacturers is in direct violation of this
right.
In return, they gain valuable insight about your life. They can use this
data for generating additional revenue streams.
33
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Our favorite software, both for work and play, contains end user
license agreements to show the intended use of the software. It may
also show the user’s default rights upon download or purchase.
These agreements tell us whether the software is free to use, backup
or resell. The end user license agreement may also include a clause
that frees the software licensing company from certain liabilities that
may arise from the incorrect or unintended use of the software – for
example, using the software for illegal activities.
If the user chooses to agree with the terms and continue, the installation
begins. Otherwise, the software will not be installed. As consumers,
this is the choice we are given and most of us (especially having paid
good money for the software), simply agree and click “next”.
Software companies
also make agreements
with government entities
and large companies
to have warranties on
their software and have
support contracts for
the software. The end
user license agreements
are very lengthy to
go through and may
have clauses to allow
government snoopers to
track the time you spend
34
Chapter 6: Your devices track every one of your moves
Other than these end user license agreements, the users need to be
wary of webcams and embedded microphones in their laptops. The
webcams usually have a light to indicate that it is on. But the camera
can be controlled remotely and not display the light when it’s on.
Now that you know how the devices are secretly spying on you
without your knowledge, here’s how you can fight back.
35
CHAPTER 7
A
gencies like the CIA and more specifically, the NSA have
increased their efforts in keeping tabs on everyone. Many
people want to know how you can protect yourself from
these surveillance attempts.
That being said, we all like our privacy and you won’t be as easy to
spy on if you have certain counter surveillance measures in place.
36
Chapter 7: How do you protect yourself?
37
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
There have been cases where people have posted vacation photos, as
soon as they took them, to social media. They later came home to see
that their house has been broken into. This means that whatever
you post online can be seen by anyone unless you change the privacy
settings on your photos and videos.
Even if you have changed those settings, it can be easy for hackers
and government officials to track your social media activity to figure
out where you are. The only way to avoid this surveillance is to
deactivate your social media accounts or limit their use.
38
Chapter 7: How do you protect yourself?
There are security weak points where your laptop or mobile phone
may potentially get compromised. If you do video conferencing with
your boss over an unsecured, public hotel network, hackers listen in
to your conversation and observe you while you’re at the conference.
You may forget your laptop in your hotel room, making it prone to
theft, or fail to password-protect one of your devices.
Update your
Antivirus, firewalls
and Operating
Systems
Chances are that right now, NSA, CIA and other agency spies may
be looking to break into Internet Service Providers (ISPs) to get their
hands on your data. What makes it worse is that your antivirus program
may not detect government malware and protect your device.
39
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
Make sure you have the latest version of the antivirus and the
operating system you use and keep updating to stay protected.
There have been times when technical operatives at the CIA and NSA
have shared webcam footage of someone’s private life with their
coworkers, without the knowledge of the one being observed. Worse
yet, there were no repercussions. Mask your webcam!
HTTPS Everywhere
The government is not alone in tracking you. Cybercriminals can
be discouraged by the use of the secure protocol “https” (https://).
Whenever you login to your online banking site, you might have
noticed the https:// preceding the webpage’s address.
40
Chapter 7: How do you protect yourself?
allows secure login. HTTPS makes sure that you are not visiting a
proxy website that is being used by hackers or criminals in order to
gain access to your credentials, including bank account info, mother’s
maiden name, social security and so on.
Next time you open up your browser, you can actually force it to
use the HTTPS as much as possible. Download the free HTTPS
everywhere extension to help you use HTTPS on all of the sites
you visit and avoid getting tricked into revealing your information.
HTTPS everywhere is available for Chrome, Firefox, Android and
more.
An alternative?
The government agencies may still track your browsing habits. If
you are really serious about taking it to the next level, there’s always
TOR. Of course, there’s never a 100% guarantee of your privacy.
Anything can be hacked if given enough time and resources. Again,
if you are going to use TOR, make sure you know what you’re doing.
If you don’t have the guidance of a trustworthy and experienced TOR
user, you could be in hot water.
41
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
The intended recipients will know that it is actually you and not
someone else who is sending the emails. This way, your recipients
don’t end up opening spammed or spoofed messages. This can be
tremendously advantageous to businesses that routinely send and
receive confidential and valuable information.
42
Chapter 7: How do you protect yourself?
The recipient will click to access the content, but not before copying
the encrypted text. They’ll answer the secret question and paste
the encrypted message in the text box that appears after they click
‘submit’. The decrypted message will be shown next on the screen.
This is a great way to send confidential documents and data to
concerned parties. The best (or worst) part is that the messages
disappear after a period of time.
Apps like Signal, which are available on iTunes and Google Play,
can be used to encrypt your messages. WhatsApp also has end-to-
end encrypted messages but is owned by Facebook. The metadata
used by it enables anyone with access to know your location and
whom you are messaging. Signal is a great application to allow end-
to-end message encryption. It’s owned by Open Whispers Systems
and stores very little (meta) data about you. It cannot look at your
43
Avoiding The Eye : Immediately Stop The Pursuit To Collect Your Data And Control Your World
44
Chapter 7: How do you protect yourself?
Go offline on a separate
device
Have a separate PC or laptop
that you don’t connect to the
Internet on. Use the laptop
or PC to create documents.
Encrypt them and transfer them
via an encrypted USB drive
to your main laptop and send
them to the concerned parties.
Keep your most private data,
just that: private.
Two-Factor Identification
The two factor identification allows you to have a separate identification
code sent to a second device such as your phone whenever you try to
open a social media website. Twitter, Gmail and Facebook etc. have
this feature so no one can access these sites except you. This gives
you the security you need and ensures no one logs on as you even if
they gain access to your password. It’s that extra layer of protection
that can make all the difference.
45
CHAPTER 8
T
he most important thing to remember is that there are billions
of people in the world and you’re not the only one that the
surveillance programs by the government are targeting. The
steps described above are to make you more aware. It is equally as
important not to lose your mind over it.
You’re not Jason Bourne, nor are you Robert Dean (Will Smith) from
Enemy of the State, nor are you Julian Assange or Edward Snowden,
- so you’re not on the high priority list for the government to make
your life a living hell.
46
Remember:
47