[Noisebridge-discuss] Do You Like Online Privacy? You May Be a Terrorist

Jake jake at spaz.org
Fri Feb 3 03:19:24 PST 2012


http://publicintelligence.net/do-you-like-online-privacy-you-may-be-a-terrorist/

Do You Like Online Privacy? You May Be a Terrorist

February 1, 2012 in Featured

Public Intelligence

A flyer designed by the FBI and the Department of Justice to promote 
suspicious activity reporting in internet cafes lists basic tools used for 
online privacy as potential signs of terrorist activity.  The document, 
part of a program called Communities Against Terrorism, lists the use of 
anonymizers, portals, or other means to shield IP address as a sign that a 
person could be engaged in or supporting terrorist activity.  The use of 
encryption is also listed as a suspicious activity along with 
steganography, the practice of using software to hide encrypted data in 
digital photos or other media.  In fact, the flyer recommends that anyone 
overly concerned about privacy or attempting to shield the screen from 
view of others should be considered suspicious and potentially engaged in 
terrorist activities.

Logging into an account associated with a residential internet service 
provider (such as Comcast or AOL), an activity that could simply indicate 
that you are on a trip, is also considered a suspicious activity.  Viewing 
any content related to military tactics including manuals or revolutionary 
literature is also considered a potential indicator of terrorist activity. 
This would mean that viewing a number of websites, including the one you 
are on right now, could be construed by a hapless employee as an highly 
suspicious activity potentially linking you to terrorism.

The Potential Indicators of Terrorist Activities contained in the flyer 
are not to be construed alone as a sign of terrorist activity and the 
document notes that just because someones speech, actions, beliefs, 
appearance, or way of life is different; it does not mean that he or she 
is suspicious.  However, many of the activities described in the document 
are basic practices of any individual concerned with security or privacy 
online.  The use of PGP, VPNs, Tor or any of the many other technologies 
for anonymity and privacy online are directly targeted by the flyer, which 
is distributed to businesses in an effort to promote the reporting of 
these activities.

from the bja / fbi poster:

Communities Against Terrorism

Potential Indicators of Terrorist Activities Related to Internet Cafe

What Should I Consider Suspicious?

People Who:

Are overly concerned about privacy, attempts to shield the screen from 
view of others

Always pay cash or use credit card(s) in different name(s)

Apparently use tradecraft: lookout, blocker or someone to distract 
employees

Act nervous or suspicious behavior inconsistent with activities

Are observed switching SIM cards in cell phone or use of multiple cell 
phones

Travel illogical distance to use Internet Cafe

Activities on Computer indicate:

Evidence of a residential based internet provider (signs on to Comcast, 
AOL, etc.)

Use of anonymizers, portals, or other means to shield IP address

Suspicious or coded writings, use of code word sheets, cryptic ledgers, 
etc.

Encryption or use of software to hide encrypted data in digital photos, 
etc.

Suspicious communications using VOIP or communicating through a PC game

Use Computers to:

Download content of extreme/radical nature with violent themes

Gather information about vulnerable infrastructure or obtain photos, maps 
or diagrams of transportation, sporting venues, or populated locations

Purchase chemicals, acids, hydrogen peroxide, acetone, fertilizer, etc.

Download or transfer files with how-to content such as:
- Content of extreme/radical nature with violent themes
- Anarchist Cookbook, explosives or weapons information
- Military tactics, equipment manuals, chemical or biological information
- Terrorist/revolutionary literature
- Preoccupation with press coverage of terrorist attacks
- Defensive tactics, police or government information
- Information about timers, electronics, or remote transmitters / 
receivers

What Should I Do?

Be part of the solution.  Gather information about individuals without 
drawing attention to yourself.  Identify license plates, vehicle 
description, names used, languages spoken, ethnicity, etc.  Do not collect 
metadata, content, or search electronic communications of individuals. 
Do not do additional logging of on- line activity or monitor 
communications.  If something seems wrong, notify law enforcement 
authorities.

Do not jeopardize your safety or the safety of others.

Preventing terrorism is a community effort. By learning what to look for, 
you can make a positive contribution in the fight against terrorism.  The 
partnership between the community and law enforcement is essential to the 
success of anti-terrorism efforts.

Some of the activities, taken individually, could be innocent and must be 
examined by law enforcement professionals in a larger context to determine 
whether there is a basis to investigate. The activities outlined on this 
handout are by no means all-inclusive but have been compiled from a review 
of terrorist events over several years.

It is important to remember that just because someones speech, actions, 
beliefs, appearance, or way of life is different; it does not mean that he 
or she is suspicious.

Joint Regional Intelligence Center (JRIC)
www.jric.org
(888) 705-JRIC (5742) mention Tripwire

This project was supported by Grant Number 2007-MU-BX-K002, awarded by the 
Bureau of Justice Assistance, Office of Justice Programs, U.S. Department 
of Justice. Each indictor listed above, is by itself, lawful conduct or 
behavior and may also constitute the exercise of rights guaranteed by the 
U.S. Constitution. In addition, there may be a wholly innocent explanation 
for conduct or behavior that appears suspicious in nature. For this 
reason, no single indicator should be the sole basis for law enforcement 
action. The totality of behavioral indicators and other relevant 
circumstances should be evaluated when considering any law enforcement 
response or action.


More information about the Noisebridge-discuss mailing list