Uncovering Spy Cops in the UK

Uncovering Spy Cops in the UK

A collection of posters from the #SpyCops campaign
Download This Episode

This week, I spoke with Dónal O’Driscoll, an animal rights activist and anarchist from the UK talking about the work of the Undercover Research Group to investigate possible SpyCops in the UK, share resources by those harmed by the lies of long term undercovers in activist communities and the current Inquiry that activists are using to unearth the legacy of police infiltration since the 1960’s.

Helpful sites:

. … . ..

Track Heard In This Episode:

SpyCops by Armoured Flu Unit from Crusading Nations

The Uprising in Belarus

The Uprising in Belarus

Anarchists and other anti-dictatorship protestors marching in Minsk, Belarus, August 11 2020
Download This Episode

Belarus is continuing to experience a revolt against the 26 year dictatorship of the post-Soviet dictator, Alexander Lukashenko. The situation came to a boil, fueled by yet another election rife with administration corruption, the creation of mutual aid infrastructure in the face of a government that abandoned public health measures in the face of the corona virus pandemic, decreased economic quality of life… people found each other and the state turned on them. In response to the police violence, regular folks came out into the streets to oppose the dictatorship and the system threatened collapse. Sounds familiar, doesn’t it?

For the hour, we speak with Ivan, a Belarusian anarchist living in Germany, about the uprising, doxing cops, the part that anarchists have played, the distinctions between pro-Democracy and anti-dictatorship activity, the upcoming week of solidarity with anarchist and anti-fascists of Belarus from November 23-30th, 2020 and how comrades from abroad can support not only those repressed but the activist efforts to sustain the resistance to the Belarusian dictatorship. You can learn more about the week of solidarity, including where to send solidarity funds and communiques at ABC-Belarus.Org. You can support wider protest infrastructure by donating at FireFund.Net/Belarus.

A great news source that Ivan mentions to keep up on anarchist perspectives from Belarus (sometimes in English) is: Pramen.io/EN/Main/

Ivan also mentions, when talking about international solidarity, US corporations that are supporting the Belarusian dictatorship during this repression. They include:

  1. Apple has attempted to pressure Telegram to close the channels where protesters in Belarus have been sharing details on the police
  2. Sandvine (founded in Canada, funded in part from the US) was providing equipment that Belarus used to block access to Twitter, Facebook and international news sites. The country has a pretty bad history ala likely use by the governments of Egypt, Turkey and Syria to repress the populations of those countries, but in this instance (and pressure from the US Gov and Human Rights Watch) they appear to have canceled their contract with Belarus in September.
  3. Skype (owned by Microsoft) has been providing court infrastructure, as the trials of those arrested during the uprising is taking place over the video conferencing platform.

Announcements

Russell “Maroon” Shoatz

Black liberation fighter Russell “Maroon” Shoatz has tested positive for COVID-19. Maroon, a former member of the Black Panther Party and the Black Liberation Army, is a political prisoner/prisoner of war held by the state of Pennsylvania. Maroon has been imprisoned since 1972, when he was given a life sentence for an attack on a police station, He was held in solitary confinement from 1991 to 2014, when he was allowed to return to the general population.

Maroon is already being treated for stage-four cancer and is forced to live in inhumane prison conditions. Given his positive COVID-19 diagnosis and his already compromised health, we demand his immediate release and the release of all elderly prisoners.

From a Facebook post on the page of Russell Shoatz III: Maroon “is a political prisoner enslaved for his efforts to liberate our people. He is the father of my dear friend, Russell Shoatz III. In addition to Covid-19, Maroon is also suffering from stage 4 colon cancer. He is living in tremendous pain, in unhygienic conditions where 30 inmates are being held in one room sharing one toilet. It is a violation of their human rights and Maroon’s agreement with the state. Maroon is asking that all supporters call the office of Pennsylvania Governor Tom Wolf and demand his immediate, unconditional release, as well as that of ALL elderly prisoners infected with COVID-19. Please call (717) 787-2500 beginning the morning of Monday, November 16, and keep the pressure on!”

Free Russell “Maroon” Shoatz and all political prisoners!”

More, including a call script, at https://kersplebedeb.com/posts/urgent-take-action-for-russell-maroon-shoatz/

Jeremy Hammond

Anarchist and Anonymous hacker, Jeremy Hammond has been released to a half-way house in his hometown of Chicago after over 10 years in prison, resisting a grand jury alongside Chelsae Manning and two bouts with Covid-19. Welcome home, Jeremy! Not sure when their next episode is due out, but Jeremy and his brother Jason both produce a podcast called “Twin Trouble”, a member of the Channel Zero Network and you can hear an interview that we did with Jeremy for June 11th this year.

. … . ..

Featured tracks:

Eviction Defense, Community Resiliency, and Getting Free: an interview with Durham HEDS-Up!

Eviction Defense, Community Resiliency, and Getting Free

Download Episode Here

This week I got the chance to sit down with Olive and Yousef of the Durham NC based eviction defense group HEDS-Up! HEDS-Up! stands for Housing Eviction Defense Solidarity and is a group which formed in Durham North Carolina when COVID was first hitting the area and folks’ housing was becoming more and more unstable.

We get to talk about a lot of topics in this episode, among which are gentrification in Durham, what the NC eviction process might look like, and about the group’s handbook the Eviction Defense Handbook, vol. 1312, as well as their all points call for autonomous, abolitionist jail support, on their website https://cantpaywontpaydurm.org/.

The Eviction Defense Handbook is extensively written and researched, and was put together by HEDS-Up! for educational and empowerment purposes. It covers topics from abolition, to how one might structure an eviction defense team, pertinent information regarding COVID and evictions, how to look up information on a specific property, a step by step of what to expect in eviction court, and many more topics.

You can email HEDS Up! at hedsup@protonmail.com

Announcements

Wabanaki Community Herbal Apothecary Support

The Wabanaki Community Herbal Apothecary in so-called Maine is working to support their tribal communities during these Covid-19 outbreaks. They are asking for herbal medicines and medicine making supplies or monetary donations to support these efforts. The supplies list can be found on their fedbook page, linked in our shownotes, and monetary donations can go to their fiscal sponsor WhyHunger, via https://whyhunger.org/ewrematriation/.
You can contact livmoore16@gmail.com for coordination or more details.

Loren Reed

Loren Reed, a 26 year old Diné (Navajo) man residing in the small town of Page, AZ, is facing ten years for comments left on facebook during the nationwide protests because some dumb ass white with no scruples or sense of humor reported him to the cops. There is a breakdown of the case available at ForgiveEveryone.Com/blog . At the end of that, you can find Loren’s address and tips for writing him, as well as how to put money on his commissary, how to make donations to Tucson Anti-Repression Crew via cashapp ($TusconARC) or paypal (PayPal.Me/prisonersupport), noting “For Loren Reed” in the comments.

Santos Torres

From PhillyAntiRepression on Twitter via the website, PHLAntiCap.Noblogs.Org:

“As of last week, Santos Torres-Olan (#ML7947), a comrade of Dwayne Staats of the #Vaughn17, is on hunger strike at SCI Albion. He’s protesting the physical, psychological, and emotional abuses at Albion — the prison administration uses meals, showers, rec and mail as a form of punishment, retaliation, and psychological torture. His protest is against the prison system as a whole. Santos has also been charged with assaulting a guard, and the courts, public defender and prosecutors are trying to railroad him. He ended up having to go pro se in order to fight his case.

Help out Santos’s struggle against the prison system by calling SCI Albion at (814) 756-5778. Ask to speak to the superintendent and make sure they know people on the outside are paying attention to their torture and abuse of prisoners.

Our incarcerated comrades are struggling against prisons on a whole different level — we MUST support them from the outside when they ask us for help!”

Jay Chase

Jay Chase, the last of the defendants of the 2012 NATO3 conspiracy case, is free! Support his post-release fund to get him on his feet: https://www.gofundme.com/f/jay-chase-of-the-nato3-is-free

Jorge Cornell and Covid-19 at FCI Fort Dix

Since late October, there appears to be a spike of Covid-19 at the Federal BOP’s prison at Fort Dix, jumping from prior reported numbers of 57 infections to at least 127 cases. The BOP is exacerbating the problem by moving all of the folks with infections onto a single floor and the back to their former dormatories, increasing spread. FCI Fort Dix is also denying PPE, medical care and compassionate releases from the prison population.

Jorge Cornell, 44, has two daughters, and recently moved to Fort Dix. Jorge has high blood pressure, sleep apnea, and is obese and borderline diabetic. This, along with a previous heart attack, make him high risk. He is being held on the third floor of Building 58-51.

Jorge is a friend of many in central NC organizing communities. As an outspoken community activist, candidate for city council, and police critic, Jorge was frequently targeted by law enforcement. Despite beating dozens of bogus charges prior to his current incarceration, Jorge is currently being wrongfully held thanks to overly broad RICO laws and targeting by the FBI, leading to a trial and conviction in 2012. He maintains his innocence, but still has 15 years left on his unjust 28 year sentence. You can hear two interviews about the case from 2013 at our website by searching ALKQN.

To press FCI Dix administration to give PPE, free medical care, stop spreading the virus in the prison by shuffling people around and to give compassionate release to people like Jorge with compromised immune systems, you can contact:

  1. FCI Fort Dix, calling 609 723 1100 ext 0 between 8am and 4pm ET, asking to speak with Warden David E Ortiz or request that the operator pass on these concerns. You can email FTD-ExecAssistant@bop.gov and dortiz@bop.gov .
  2. Federal BOP Health Services Division: 202 307 3198, press 4 for “other” and then 6 for “general medical inquiries” and select any of the four available recipients, leaving a voicemail with your demands. Email BOP-IPP@bop.gov or PublicAffairs@bop.gov .
  3. BOP Northeast Regional Office can be called at 215 521 7301 where you can reach Regional Director Nicole C. English or request that the operator pass on your demands. You can email NERO-ExecAssistant@bop.gov and ncenglish@bop.gov .
  4. Senator Cory Booker in Newark (973 639 8700) ,Camden (856 338 8922) and/or DC (202 224 3224) and ask to leave a message. You can submit an email using the form at https://www.booker.senate.gov/contact/write-to-cory

Brian Caswell McCarvill

Regular listener, Jay in Aotearoa brought to our attention this week the passing of anarchist prisoner, Brian Caswell McCarvill in the so-called state of Oregon.

Brian McCarvill was a radical social prisoner who in the early 2000’s was involved in taking the Oregon Department of Corrections to court challenging their censorship and rejection of anarchist publications for prisoners with his cell mate Rob Thaxton. The ODOC was attempting to declare anarchists to be members of a Security Threat Group, sort of like a gang, based on their shared political tendency and use of language and symbols, their stances to protest unfair circumstances. By winning the court case he forced the Oregon prison system to allow anarchist materials into its prisons.

Brian had terrible problems with his health and following his victory in the court case, he was being punished by the authorities for taking a stand. He passed on his 68th birthday, September 27th 2020, causes unknown to us. Rise In Power, Brian!

. … . ..

Public domain music for this show:

90’s BOOMBAP – RAP INSTRUMENTAL / Old SChool 2017 FREE USE

 

 

Cora Borradaile on Phone Extraction, Cloning and Keyword Warrants

Cora Borradaile on Phone Extraction, Cloning and Keyword Warrants

image of a cop holding a cellphone
Download This Episode

This week on the The Final Straw you’ll hear me speaking with Cora Borradaile, who sits on the advisory board of the Civil Liberties Defense Center and works around issues of tech security in movements and is an associate professor at OSU.

We discuss the use of phone cloning by US Marshall’s and other law enforcement while engaging protestors in Portland, OR. We talk about UpTurn’s recent report concerning widespread use of cellphone extraction tools to copy and search the contents of cell phones captured during interactions with cops. Finally, we talk about Keyword Searches, where (often without warrants) google hands over information from peoples google searches to law enforcement.

Sean Swain Update

We’ll also be presenting a segment by Sean’s fiance, Lauren, about his current silencing and the injustice of his case. More on president-in-exile Sean Swain can be found at Swain2020.Org and SeanSwain.Org.

. … . ..

Transcription of the conversation with Cora Borradaile

BOG: So I’m speaking with Cora Borradaile who is on the advisory board of the Civil Liberties Defense Center or CLDC and we spoke before about a range of issues in May of this year, and before the George Floyd uprising and the resulting ACAB Spring. During the uprising researchers, journalists, and activists saw that applications of new, or new to us, surveillance methods were being used by security forces against the populace in the so called US, so I was hoping to pick Cora’s brain a bit about this and see, especially since upcoming months in the US also might get a little spicy with the election and all. Thank you Cora very much for taking the time to have this conversation.

Cora Borradaile: Yeah, it’s great to talk to you.

BOG: So just to list off a few things, like this summer we saw the use of military drones surveilling and sharing information with law enforcement in Minneapolis, lots of militarized gear being brought out in the streets across the US, or for late May at least protests against police violence, and collusion with para-state white supremacists have been ongoing in Portland, Oregon. In July we saw the deployment of federal officers from the Department of Homeland Security (DHS) including Customs and Border Patrol (CBP), and the Department of Justice (DOJ) sent out to fight against protesters in the streets of Portland and attack and kidnap people. Including journalists from that and other cities. the US Marshalls also had their own aerial surveillance to track crowds in Portland, it came out this summer. On the tech side of things, the public got wind, apparently from leaks within the department of homeland security, that DHS had been cloning activists’ cell phones. Could you talk a little bit about this and what cell phone cloning is?

CB: Yeah, from that report their were very few details so a lot of it is guesswork as to what could possibly be going on. I could imagine two different ways in which their cloning cellphones- One which is scarier than the other. The more likely I think, is the less scary version which is if they manage to physically get your cell phone, like if you’re arrested and your cell phone is confiscated from you. Even if it’s confiscated temporarily, then they’re copying everything from your cell phone and possibly making a new cell phone that behaves just like your cell phone. So it would allow them to intercept calls possibly receive messages that you were intended to receive.

The scarier version but probably less likely, is the ability for them to be able to do the same thing without having the need to confiscate your phone to do so. That feels unlikely to me that they were doing that. If it was some sort of remote cloning I would gather that they were just cloning the sort of network ID of your phone, and not the contents of your phone. This would still allow them to do things like intercept calls, and intercept data, but in both scenarios I think end-to-end encryption (E2E) apps that you use like Signal or Keybase or Wire, that enable E2E encryption, I think the messages you’re receiving there would still be safe and that the cloned device shouldn’t be able to have the keys enabled to decrypt those messages that were intended for you. And even traffic that is encrypted – if you are visiting a website on your phone that your accessing via HTTPS, where the S stands for Secure – I think that even they wouldn’t be able to see the contents of that web page either because there is a key exchange that happens between you and the web server that they would have to play man in the middle on. Which is more complicated to do in a way that you wouldn’t be able to tell that something was going wrong.

All that’s to say, it’s still scary and I think if you have poor encryption practices like keeping your phone in an unlocked form, they have access to all of your encryption keys for things like Signal and Keybase and whatever other secure messaging apps you might be using. You should do whatever you need to do to alert everyone you contact with to delete your contact from their messages, groups, and so on. And if you have a phone that is confiscated – and certainly in an unlocked form – I would not trust that phone again. If your phone is confiscated but it was locked at the time and presumably you have a good password so they can’t easily unlock your phone, I would still maybe do a factory reset of your phone and start fresh by installing everything over again.

BOG: So, I’m not sure what the basis of this is, but conversations that I was having with friends when we were talking about the latter of the two instances that you were talking about- the hypothetical that remotely the cloning of the network ID or SIM connection could be done. It would be similar to you getting a new phone but having the same number, and that if Signal was installed on that device and it was connecting to the same phone number, by a Man in the Middle attack via a cloned SIM, it would appear that the interception could still be happening but that everyone would see a notation that there had been a change in safety number. Is that maybe what would happen?

CB: Yes. That is perfectly said. Right, so for them to be able to both clone your phone and intercept messages without those “safety number has changed” messages happening would be very, very difficult. So yeah, certainly if there are reports of anybody who’s had a confiscated phone and then all of a sudden all of their contacts are noticing that their safety number has changed with them, that would be super interesting to find out. —

BOG: –Or they stopped getting messages.

CB: Also horrifying.

*Laughter

BOG: Yeah. You know, they noticed that they stopped getting messages, everyone notices that the safety number changed, then that means that hypothetically the cloned phone or whatever would now be in those chats.

CB: So I don’t know if it’s as simple as that, because when you add a new device on Signal all the other devices get a notification of that.

BOG: Oh I see. So if I had a desktop and at least one cell phone that was getting messages… Yeah, but if that device was no longer getting new messages because the traffic was being routed to a different device, you wouldn’t like –

CB: Right so, your contacts should at the very least get the notification saying that the safety number has changed. If it’s a remote clone I think the only way in which the cloned phone would be able to read the messages in preexisting groups, for example, would be if the device was physically confiscated and copied. Because there are encryption keys that are used to start those conversations which are needed.

BOG: Do you mean the messages that were in loops before?

CB: No, to continue to receive messages from conversations that had already been going on. If someone started a new conversation after the cloning then the other people in the conversation might not be able to notice, but if you were continuing a conversation that had started before the cloning I don’t think you would be able to get that information without having physical access to the device and being able to copy over the encryption keys that were used to start those conversations.

BOG: Because they’re being stored on the phone and not on the server.

CB: That’s right, yeah. So for example, when you add a new Signal device part of what happens is copying over the encryption keys needed to continue conversations. And there’s a QR code that, say if you have Signal on your phone and you start using Signal on your desktop, you link those 2 devices so that both devices are able to receive and decrypt messages that go to you as an identifier.

BOG: If you know that if someone in your group or one of your friends has changed their number, whats a good verification?

CB: Don’t message them on Signal, and ask them, right? Because who knows who’s answering. Try to find a different form of communication even if its via friend or via a regular phone call, but ideally via email or some other band that is unrelated to your phone would be perfect to ask them, ‘Hey, I noticed your Signal safety number’s changed, what went on?’ Most of the time, or every time this has happened to me, the answer’s been ‘Oh, I had to reinstall my operating system on my phone’ or ‘I dropped my phone in a pool and had to get a new phone’. That’s usually the reason for a safety number changing, but definitely what you want to do is find a different way to ask that, other than using Signal and ideally other than using the phone. Especially if we are worried about cloned phones. Because if you just use a normal SMS text message to send to your friend and your friends phone has been cloned, then it could be the cops responding saying ‘Oh, yeah I had to get a new phone’.

BOG: I’ve seen some people do a thing where they ask someone in a group, when their safety number changed, ‘Hey could you leave a voice memo with your name and current time that you’re recording the memo and send it into the loop?’ And that way everyone hears this person’s voice, and it’s the time when they specifically get asked to record the memo so it’s outside of Enemy-Of-The-State-level NSA level operation that’s probably not somebody compiling an automated voice message in that person’s voice.

CB: Yeah, that’s a pretty good method for doing that. As you point out, synthesizing peoples’ voices can be done, but taking into account what your threat level is – are you someone who they’re going to be throwing everything at and be able to synthesize your voice in a very short time? For the protest movements we’ve seen, probably not. However if you are the leader of a protest group, hmm… If you are someone that they’re really going to be going after because they think that going after this one person will completely destroy the movement – which I don’t think is the kind of movement time that we are in right now which is good, to avoid those specific people who could really destroy a movement – that’s a pretty good method.

BOG: If you could speak to that prior scenario, is that actually copying the contents of a phone? I think that was the subject of the recent article by Upturn called Mass Extraction —

CB: That’s right.

BOG: If you could talk a little bit about what the findings were there. I was kind of surprised yet kind of not surprised to see the local law enforcement here in Asheville spent at least $49,000, according to their studies, on cell phone extraction tools. But what are mobile device forensic tools, and what do you know about them, how widespread and what kind of stuff do they do?

CB: So these things have existed for a long time. We’ve been talking about them at CLDC for a long time but this Upturn report is really wonderful for just as you say, how widespread they are. Small police departments have them, medium police departments spend hundred of thousands of dollars on access to this over the course of 5 years, and some of the capabilities were actually, I suppose, not really surprising. But reading them all in one place and knowing how low cost access to that technology is was sobering.

So these cell phone extraction devices, they come in different forms but the kind that is most popularly seen is a small stand alone device that you plug a cell phone into and that stand alone device either tries to break into that phone if it’s locked or otherwise just copies all of the content of that phone for later analysis. Some of the things that were surprising to me was how much was available even when the phone was locked and encrypted. There’s a lot of data that is existing in an unencrypted form on your phone.

For example say your phone is locked, you receive a phone call and the name of your contact still shows up, right? It’s not the name that your contact is sending you, its not metadata associated with that contact. if your mother is calling you, it probably shows up “Mom” in your phone, and the reason it says that is because your address book has an entry with that phone number and the name “Mom” attached to it. So your address book entries are existing in an unencrypted state, for example.

Some of the other things that were sort of surprising that were pointed out, that exist in this unencrypted state even though your phone was in a locked condition, were Telegram files and Discord files, and files associated with Google mail. I think a lot of this stuff could just be from bad decisions that the app developer made. Like Telegram is not necessarily focused on security, and so for convenience or speed they may just not be hiding that information behind the device encryption.

There was definitely some reporting in that Upturn report about being able to brute force guess passwords and so there are some things that you can do to protect yourself from that, which is to have a long enough password. Or if you have an Apple device you can enable your phone to self-wipe if you have 10 incorrect guesses, for example. Which if you have a small child at home maybe you don’t want to do because I almost guarantee you will end up with a wiped phone by the end of the week.

BOG: With encrypted files, if there are messages or what-have-you that are saved in an encrypted section on the phone would that just get copied and saved, and tested against decryption later? Is that the idea?

CB: I think what’s happening in most cases is they’re taking a copy of encrypted information, possibly in the hopes that they could decrypt it later or in the hopes that they would be able to get the unlock password from you by other means, like a court order for example. You know, they did point to instances where they were still able to bypass security features like encryption because of security flaws, which is very common. If your phone is badly out of date and you haven’t been keeping up with installing security updates, always install your security updates. That’s a common thing in computer security, that there are flaws that can be taken advantage of that can allow bad actors to break through otherwise strong encryption. But I think if you’re keeping an up-to-date phone, I think that’s the best that any of us can do.

BOG: Another point that was interesting in the article, and I’m glad that they pointed it out, was the sorts of instances when this is being applied to people. You hear about Apple being pressed to give up encrypted information or give a back door when there’s a mass shooting, or a sort of incident that may involve multiple conspirators and the loss of life – something very serious. But in the Upturn article they talk about how through their research and requesting of records it showed that a lot of law enforcement agencies, even local law enforcement agencies, are attempting either to pressure people whose devices they get a hold of or apply for warrants to copy peoples’ contents of their phones for minor things that they’re being accused of.

Like if it’s something like shoplifting or graffiti or public intoxication, petty drug charges, sex work, these are a few of the examples that they give. Considering the way that policing works in the United States, and this shouldn’t surprise anyone in the listening audience, police tend to focus their attention on poor and racialized parts of the population. So if law enforcement gets people’s data, whether by asking for it and pressuring people into it or by using devices, and then saves it for a later investigation and there’s no sort of oversight of this, it seems very likely that the sorts of data that they’re collecting could be used to build future cases or for building profiles on people for things they haven’t actually been accused of so far.

CB: Yup. Phishing for data. Maybe they’re just trying to justify the purchase of this stuff. In Oregon they spend half a million dollars on cellphone extraction technologies, Portland alone spent a quarter of a million in a period of 4-5 years. That’s a lot of money to justify, right? If you’re only using it 3 times a year for homicide cases then maybe you can’t justify actually spending that money and you would just farm out, whenever you do need it for something like that, either to a fusion center or a pay-per-service from one of these companies. So it might just be they’re partially covering their asses and saying ‘Oh yeah, we use it 10 times a week’.

But we’ve also seen examples of law enforcement agencies that just collect so much data, almost for the purpose of just having data. The LAPD famously uses Palantir which is a horrible company, to do all sorts of data analytics for their region collecting data on pizza purchases and parking passes and all sorts of things that don’t seem relevant at all to law enforcement, but it’s almost a compulsion to just collect the data and see what they can do with it.

BOG: Another thing that I had seen was Google was recently in the news when court documents were unsealed in Detroit relating to witness intimidation and arson by an associate of R. Kelly, and this in regards to keyword warrants. Are you familiar with this case and could you talk a little about keyword warrants and what they are?

CB: Yeah, so keyword warrants. I hadn’t heard about them before this news story came out earlier this month, but it’s not surprising. I certainly was familiar with just how many requests for data Google gets and responds to, affecting hundreds of thousands of user accounts every year in the US. So it wouldn’t surprise me if Google, instead of just getting requests saying ‘Hey, I’d like to have all of the emails associated with email address thefinalstraw@gmail.com’, which seems to be the more straight forward type of request related to a specific account that might be included in a law enforcement issue… probably not though. To expand that to ‘Hey, I want to know all of the information you have about people who searched for ‘The Final Straw’ ’. So that’s the keyword warrant or the keyword search request that happened in this case. We’ve seen examples of Geofencing warrants happening for Google Maps asking for anybody who has searched for an address within a given region, that there were a few stories about over the last year. So yeah of course, the data is there why not ask for it? Google is not going to say no, why would they?

BOG: Basically, again by collecting information based on its availability then attempting to apply it. So in this case with the arson, they asked for people who had searched for the address of the house where a car got set on fire within a certain period of time and then cross-referenced that to a Geofence of what phones were in the area within a period of time, and were able to pinpoint and place charges. And not all of the information came out from that, some of the court records are still sealed. It’s kind of a frightening application of technology and as you say, a very happy-to-oblige industry.

CB: Yeah. I think the potential for false arrests and harassment of people, like say you happen to find someone in that area who you don’t like for one reason or another you can arrest them and hold them for a while even if you have no evidence. Harassment arrests are used all the time by law enforcement and have been for decades, centuries probably.

BOG: So I guess… use DuckDuckGo if you’re going to be committing an – – – – ?

*Laughter

CB: I would avoid Google, I definitely use DuckDuckGo. I prefer DuckDuckGo for selfish reasons, I find the personalized search aspect of Google to be somewhat infuriating. When I search for something I don’t want to find what Google thinks I want to find, I want to find the documents related to my search. It’s hard to avoid these tools, but I think DuckDuckGo, anything but g-mail for email please, and there are alternatives to Google Docs as well. Cryptpad seems to be getting better. Every month there are improvements. It offers collaborative online editing to documents, all E2E encrypted.

BOG: I am going to presume with this question that you are not a lawyer, am I correct in that?

CB: I am not a lawyer, no.

BOG: It seems things like intercepting phone calls, peoples text messages, or getting deep into their cellphones and all of the information that’s collected in them for arguably unrelated topics, might overstep into the realm of FISA (Foreign Intelligence Surveillance Act), or might overstep into the realm of one of those amendments that protects our rights against unfair search and seizure. That just doesn’t seem to be the case? Or in these instances is it that these methods haven’t been brought before courts to be challenged?

CB: Everything I know about the law I learned from CLDC, and Law & Order in a previous lifetime. So what I do know about these from reading various news articles and conversations with CLDC is, as pointed out by Upturn, a lot of the extraction of data from cellphones was based on consent and not a warrant. It was about a 50/50 split depending on jurisdiction. So this was probably the case of intimidation by a cop to a person with a cellphone, to say ‘Oh, well let us check your cellphone”. I’m not sure if they give full disclosure of what they mean by ‘let me check your cellphone’, right? (laughs) ‘Let me copy everything there is on your cellphone off your cellphone, if you’re not guilty of this minor misdemeanor’. You know, they’re just asking permission.

That’s one of the things CLDC shoves down the throats of everyone at their trainings, which is don’t consent to searches. Just don’t do it! Even if they’re going to go ahead and do the search, even if you’re not consenting to it, say over and over again ‘I do not consent to this search’. Have a sticker on your phone that says ‘I do not consent to this search’. Because then it can’t be used in the court of law at least. The other thing that we’ve seen over the years is, parallel reconstruction. I don’t know if I’ve seen a well researched example of this but certainly people have hinted that this a common practice, where they’ll find out something via methods that wouldn’t be admissible in the court of law and then they figure out a way to reconstruct what they know using admissible methods.

BOG: Oh like in The Wire.

CB: Yeah, exactly. So that’s something that might be why they’re getting information that they can’t necessarily use. The other part is just general intelligence work. It’s not necessarily going to be used to arrest anyone, it’s not necessarily going to be used in a court of law, but they just want to know what’s going on, and so are going to collect as much data as they can. Unless you find out about it and unless you prove harm in a court of law, then how are you going to stop it from happening? Which is why this report about the Google keyword searches and Google Geofencing searches is so important. If we can find out about that and we can get a case brought forth and have it deemed unconstitutional to do this kind of search then that would stop those kinds of requests from happening. Then you could put pressure on a company – even a company like Google – you could put public pressure on them to say ‘Don’t respond to these requests, they’ve been deemed illegal’.

BOG: There are a couple of other, I guess not insights but points in that Upturn article that I thought were useful. Like if someone deletes information on their phone, are they actually deleting information off of their phone, and are there appropriate or useful, good tools for actually wiping data off of phones or does it just kind of sit there?

BOG: –MAGNETS–

CB: I don’t know of a good tool. I think that if you do a factory reset of your phone that’s most likely to help make that data inaccessible. Even then, is it actually getting completely deleted? It might not be. You have memory on your computer or on your cellphone, and when you delete something it just kind of takes the index away… I’m trying to use an analogy that people would remember. Do people remember libraries and card catalogs? (laughs) All of my analogies are too old.

BOG: I think it’s fair, go ahead.

CB: You think people will remember?

BOG: I think so, or they’ve heard the analogy enough they’ll recognize what a card catalog is.

CB: They’ve seen a movie with an old-timey library and card catalogs?

BOG: Ghostbusters

CB: So. you have a big library with books on all the shelves and the way you know where to find a book is to go to the card catalog. You look up the book that you want and you find its listed location on the shelf and then you go to the shelf and you find the book. Well now, when you delete a file from a computer, really all you’re deleting is the card from the card catalog. So when it comes time to put a new photo in the memory of your computer or cellphone, you go to the shelf and you find out ‘Oh, there’s supposed to be space here because according to the card catalog there’s nothing stored here, so this old data must be something that I don’t need anymore, now I’m going to delete that old stuff.’ Right, ‘I’m going to remove that book from the shelf whose existence was deemed not there anymore by the card catalog, I’ll throw it away now and put my new one in.’ So it’s not until you use the memory again that the old information actually gets deleted.

BOG: At least on computers there’s – for instance I had to reinstall my operating system recently. And when I installed it I went to encrypt the home folder and the file system and it asked ‘Do you want to overwrite everything else on the hard drive?’ Is that what you’re talking about?

CB: Yeah, so that would be the equivalent of actually going to all the shelves of the old library and removing all of the old books. So that’s pretty common when you’re setting up on a computer but I’ve never seen that option on a phone. I’m wondering, does a factory reset actually delete all of that information? I haven’t noticed that myself.

BOG: Microwaves. I mean I saw –

*Laughter

BOG: Yeah, I got nothing.

CB: Drop your phone in the pool, start over.

BOG: They invented this thing called rice though, where if you put your phone into a bag of rice it extracts the water… and the data…

*Laughter

BOG: Well are there any other things you’d like to share with the audience concerning digital tech or any insights?

CB: I did want to share one thing. You asked about them getting this data, and is this illegal search and seizure. There are still strange laws that date back to the 80’s, for example e-mail can be accessed by law enforcement form somewhere like Google with just a subpoena and not a warrant, necessarily. For a law enforcement agency to get information that would otherwise be deemed illegal search and seizure, they need to get a warrant from a judge that proves probable cause for them to get that data or that physical item. But if it’s email on a server held at Google then they don’t need to prove probable cause and they just need a subpoena which is essentially just a ‘Please can I have this information’. I think that’s where these keyword searches are coming in, I’m not sure that they actually need to have a warrant for those. So that’s maybe one extra detail on that front.

BOG: In those instances it’s in one centralized place, although if your doing a keyword search… Yeah I don’t know– I guess I don’t know how Google works on the inside and if it’s just constantly categorizing what people are typing into its different services for later use and then providing that in easily digestible pills to law enforcement. If you’re sending email and it’s unencrypted, it’s probably getting Hoovered up somewhere and fully readable anyway.

CB: Depends on who your adversary is. I don’t think the Portland police department has access to a big Hoover of data on a global scale, but they certainly can ask Google for all of the emails of the activists whose email addresses they’ve extracted from the phones they confiscated during protests.

BOG: Cora, thank you so much. Cora is an associate professor of Computer Science at Oregon State University with a focus on Security State and The Adoption of More Secure Apps, and also is on the board of the CLDC. Thanks again for having this chat.

CB: It was wonderful talking to you, as always.

 

Certain Days: Freedom For Political Prisoners Calendar 2021

Certain Days: Freedom For Political Prisoners Calendar 2021

2021 Certain Days: Freedom For Political Prisoners Calendar cover
Download This Podcast Bonus

For the release of the 2021 Certain Days: Freedom For Political Prisoners Calendars we caught up with Josh, Sara and Daniel, three outside collective members. There’s no point in me explaining about the project when they do such a good job in the next 40 minutes! Calendars are now available via BurningBooks.com in the so-called US, LeftWingBooks.Net in so-called Canada, and via Active Distribution (soon?) in Europe. Check out an interview we mention with Xanachtli and David Gilbert on Treyf Podcast.

We also talk about Jalil Muntaqim’s release from prison after almost 50 years. Well, he’s been re-arrested by a politically motivated warrant from Monroe County DA Sandra Doorley’s office for allegedly attempting to register to vote and is being accused of voter fraud! There is an article and a petition and more information available on the SFBayView National Black Newspaper’s website.

More information on the case and support for Eric King can be found at SupportEricKing.Org. To hear our chat with Eric from last year, take a listen to this interview. Also, the recent interview by the Solecast of Robcat of Fire Ant Journal (to which Eric contributes) was quite lovely.

We’ll close out now with a track entitled “Back To You” and performed by The Hills The Rivers. You can find it and more on the album Burning Down: The Songs of Anarchist Prisoner Sean Swain.

Resisting State Repression Panel

Resisting State Repression Panel

Download This Episode

The following is a conversation between folks involved in anti-repression work in 5 parts of the so-called US. The goal was to present a zoomed out vision of scope and patterns of repression since the Floyd Uprising of this summer, particularly as the US sits in a period of heightened tensions around the elections and continued killings by police. Please consider sharing this chat around. We need to be ready to push back against repression and support the mostly BIPOC folks facing heavy charges for hitting the streets against white supremacy.

You’ll hear from:

Stolen Lives

In the conversation, we hear about a few cases of folks attacked and/or killed by police in the communities our guests come from and whose memories contributed to the Uprising where they were. These include:

  • Rodney J. Freeman (killed by Dane County Police in Wisconsin);
  • Elliot T. Johnson (killed by Monona Police in Wisconsin);
  • Jacob Blake (brazenly injured by Kenosha Police);
  • John T Williams (killed by Seattle Police);
  • Charleena Lyles (killed by Seattle Police);
  • Kevin Peterson, Jr. (killed by Clark County Sheriff deputies in Washington State);
  • Bernardo Palacios-Carbajal (killed by Salt Lake City Police);
  • Atlanta: Rayshard Brooks (killed by Atlanta Police);