Skip to main content

POST 007.com

It’s really hard to be James Bond these days. Apart from health & safety restrictions on the use of poison umbrellas and the legal restrictions of the murder of foreign-looking goons, and all the paperwork around the expenses, you’ll be rumbled in an instant by your Facebook account. Because you don’t have one.

It is not simply a question of keeping details offline, either, but the opposite: individuals or identities without deep, broad online presences are precisely those likely to raise suspicion. “The challenge of having a credible digital footprint is significant,” Mr Inkster said. Fake Twitter or Facebook accounts alone do not make the grade.

From The spy who liked me: Britain’s changing secret service - FT.com

If I come across someone in a work context, and they are not on LinkedIn, then I assume that they are either in the witness protection programme or have been in prison. And of course if you are not yourself on Facebook, then it’s only a matter of time before some schmuk snaps you and you’re in the system. You could be out and about with an important business contact having a very important business discussion about important business issues, for example, but because of the camera angle and the perspective a snapshot of this event might be entirely misconstrued.

And once you’re in the system, you are no longer anonymous whatever you might think about being off the grid.

Give Facebook two pictures, and it can tell you with 97 percent accuracy whether they're the same person, roughly the same accuracy as a human being in the same spot.

[From Why Facebook is beating the FBI at facial recognition | The Verge]

The old spies had to stake you out and track you down and stalk you and then murder you in a dastardly fashion. Now they just run the face recognition software until you pop up somewhere and then… it’s radioactive sushi time. Until my plan for Facebook-blue burkhas for all is accepted by the mainstream I’m afraid I can no way rounds. By the way, I noticed in the newspapers that while it may be increasingly difficult for spies to convince people that they are not spies, it is apparently much easier for people to people other people that they are spies.

Mark Acklom convinced her he was a spy and defrauded her of £850,000 

From Gloucestershire woman fell for 'charismatic' fraudster who claimed he worked for MI6 | Daily Mail Online

I don’t want to pick on this poor woman, and I know only too well how easily women can fall under the spell of handsome and charismatic Englishmen, but had she never heard of LinkedIn? If a match.com counterparty was trying to convince me that they are from MI6, I would fully expect to open up their LinkedIn profile and see a convincing employment narrative going back many years. And if they didn’t have a Facebook profile, then I’d naturally assume them to be a fraudster. 

Spies are an interesting use case when you start to think about the series business of population-sale identity they present a problem. If the purpose of a national identity system is to uniquely identity someone, then you don’t want it to ping back “James Bond” when 007 has to use the biometric identification system at the casino entrance.

Comments

Popular posts from this blog

Financial Cryptography: Corda Day - a new force

Forum friend Ian Grigg, who I always take very seriously indeed on any such topic, wrote about Corda on his blog and concluded with a powerful statement. Bitcoin told the users it wanted an unstoppable currency - sure, works for a small group but not for the mass market. Ethereum told their users they need an unstoppable machine - which worked how spectacularly with the DAO? Not. What. We. Wanted. Corda is the only game in town because it's the only one that asked the users. It's that simple. From Financial Cryptography: Corda Day - a new force xxx It seems to me, however, what Ian is pointing to as the greatest strength of their approach is also the greatest weakness. A staple feature of unimaginative management consultants presentations about innovation is some variation on the statement by Henry Ford that if you had asked users what they wanted, they would have asked for faster horses coupled with some variation on the statement by Steve jobs that it was pointless ask...

There is no excuse for not taking cards

So we went to the pub. For lunch. Seven of us. Say £20 per head. £100+ quid. Say £50 quid gross for the pub. Colleague goes to order food and drinks and pay at the bar. Apologetic barmaid comes over to explain that their “card machine” is down, so she can only accept cash. Under normal circumstances I would have simply walked out, feeling it wholly inappropriate to reward such a poorly managed establishment and, as a functioning actor in a capitalist economy, done my duty to depress their lunchtime takings. Here’s what we wanted to say: This is absurd. This is 2016 not 1916. Your card machine is down? Well, so what! Are you seriously telling me that mein host has no mobile phone number capable of registering for PingIt or PayM? That none of the staff or the pub itself have a PayPal account that I can send the money to? That neither the owners nor managers not contingency planners thought to tuck an iZettle behind the bar to use when the clunky and expensive GPRS terminal fails for o...

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...