by Piper Bayard
of Bayard & Holmes
I write with a partner who is a 47-yr veteran of Intelligence Community field operations. My friends know to unplug their Alexas and their Smart TVs when I’m in a room. Sometimes, I even ask them to turn off their phones and put them alongside mine in their microwave oven before a conversation continues.
This is not because I talk about classified information. I don’t. It’s also not because I’m particularly interesting. I’m not. It’s because I know who does think I’m interesting and how they can use the mundane information of my day.
Today, we will only look at spying on the part of corporations and governments. For information about hackers and their criminal activities, see my earlier WITS article, “Hacking: It Isn’t Just for Thrillers Anymore.”
In short, all of them. If it has a mic and/or a camera and connects to the internet, it can be and likely is being used by someone to listen to everything we say and watch everything we do within the field of reception.
Writing Tip: For our characters who are undercover or in hiding, this means they either hide in plain sight with plastic surgery and false identities, or they must be very isolated to be genuinely off the grid. It is not enough that they don’t carry their own electronics or use credit cards. Cameras and mics are ubiquitous in our daily lives, and they are all watching and listening in. With facial recognition software, our characters are not likely to be able to hide in society for very long.
Smart TVs, Alexa, Siri, and all other voice-activated electronics are created specifically to listen for and respond to commands.
Think of those devices as entire teams of marketing specialists and hostile government spies sitting in our living rooms with us, and they never sleep or go away unless we unplug them and/or toss them in the garbage at the curb.
Devices often come with manufacturer statements saying that they only collect “voice data” for the purpose of recognizing and responding to commands. However, for the device to determine whether we are issuing a command, all detectable sounds are collected and transmitted to an unnamed third-party vendor.
Companies that sell electronics do not release information about that third-party vendor. That anonymous third-party vendor owns and maintains the computer hardware that runs the programs that collect and sort through everything that is said to determine if anyone is giving a command to the device.
These devices also usually come with language stating that the company does not sell the voice data they collect to third parties. Keep in mind that “voice data,” as it pertains to the device, might only include legitimate commands. So what does the company do with all of the rest of the data collected that does not fall under the definition of voice data?
They can and likely do sell our data to marketing firms, governments foreign and domestic, private individuals, organized crime, or all of the above. The firms, corporations, governments foreign and domestic, and people who purchase our data can then do whatever they please with it.
In addition to the third-party vendors that collect all of our singing in the shower, there is the fact that the electronics are made somewhere.
That somewhere is inevitably the PRC. Communist China. West Taiwan. Xi Jinping’s Hundred Acre Wood.
Virtually every electronic device that is produced today is assembled in the PRC. It is simply assumed by those in the computer industry that both corporations and governments that come in contact with electronic components during the course of their production will attempt to design in what are called “back doors.” Back doors allow those corporations and governments to access devices without having to expend the energy of hacking.
In other words, the PRC installs back doors or at least attempts to install them into all of the electronic devices it assembles. The PRC does this specifically to spy on the West as part of its Thousand Grains of Sand intelligence-gathering program described below.
Electronics corporations, Western governments, and most people under the age of twenty-five know this, but, hey, cheap stuff and convenience, right?
Phones are especially convenient for governments and corporations to use to collect information.
They can use phones to locate and track people, collect conversations on and around the phone, and watch people through the phone cameras. Software can be embedded in phones by apps or at public WiFi locations. Phones also send signals that talk to other electronic devices around us.
For example, phone conversations are regularly intercepted by such things as the IMSI-catchers, or “stingrays,” that police use to hijack cell phone connections to spy on people. Stingrays mimic wireless cell towers and “force” all surrounding cell phones and mobile devices to connect to it.
Their use is widespread across America. It’s an easy bet that the Department of Homeland Security has perfected the art. The legality of such unwarranted police surveillance practices is still being debated in the courts.
Also, the PRC, Russia (and any other nation that can afford the surveillance infrastructure) collect all of the phone conversations in and around Washington, D.C., San Francisco, New York, Chicago, and other major Western cities.
Those nations are not concerned with any legality. However, we do not know how efficiently they can actually sort through all of that data.
Phone apps exponentially increase the spying capabilities of corporations, particularly in the realm of geo-location. These apps are used for the physical tracking of individuals for the purpose of generating filthy lucre.
Such companies as Google, Facebook, and Verizon capture their users' locations and sell the data to marketing corporations. This is actually all completely legal, as people agree to this tracking in the terms of the operating system, application, and telecom company when they agree to “terms” during the installation or start-up process.
Keep in mind that when we agree to those terms of service that allow these companies to do such complete surveillance on us, we have no idea what they will do with the information they glean. They might only sell it to marketing companies, who then sell it to whomever they please. They likely also sell that information to governments both domestic and foreign, which use it.
They have mics. They have cameras. They connect to the internet. They were made in China, or at least they were assembled there. All of those corporate terms of service are the same for tracking your online movements. I’m sure you can do the math.
The primary reasons to collect, store, and transmit our data from our electronic devices, aside from the criminal activities of hackers, are marketing and espionage.
Notice how we can have a conversation about Bragg’s Organic Vinegar in the range of an electronic device, and an ad for Bragg’s pops up on our computer? That is not a coincidence.
Companies have agreements with each other to share information about users for targeted marketing. In other words, our phone company collects the voice data and shares it with our internet carrier, which shares it with marketing corporations, which share Bragg’s with us.
A more direct connection is when the same company provides us with both phone service and internet service. Whatever is said on the phone almost immediately translates into ads all over the computer because all of the middle players are cut out of the process.
Then there is the marketing power that comes from location-tracking technologies made possible by phones. Location-tracking technologies follow people through stores using the apps on phones.
Stores can tell if someone put on makeup, tried on clothes, stood staring at their favorite cookies for ten minutes, etc. Marketing experts have no scruples when it comes to collecting our data and turning it into money.
Your data, or shall I say your data, is the pay dirt of the computer age. It is worth more than gold, oil, or lithium. Keep in mind, too, that any data collected for marketing purposes can be used for more nefarious purposes as well.
Many governments, such as the PRC, are hostile to the rest of the world, and particularly to Western governments.
The PRC is one of the most dedicated and most successful governments that practices electronic espionage, and it does so by being the world’s manufacturer of electronic devices.
The Chinese approach to espionage, known as the Thousand Grains of Sand, is different from that of the Western world and other countries.
While the Chinese have professional intelligence services like other countries, what’s different is that the entire Chinese population also has a legal duty to spy for the PRC, from fishermen (see Key Moments in Espionage), to business people, to tourists, to teachers, to students, to nannies and maids.
The Chinese government wants to collect all of the millions of “grains of sand” that it can glean from listening to and watching people around the world, either through human interaction or through electronics.
These are only a few of the reasons the PRC and other foreign governments want to spy on us in our everyday lives:
I can personally attest to the effectiveness of the PRC’s campaign to listen in on the average American. As a decades-long student of political propaganda, I have seen the Chinese go from being blunt objects to precision tools in their online social media accounts, mastering the language, slang, and word sequencing of their targets to the point that experts have to stop and think twice to pick out the spies.
That is why each and every one of us is far more interesting to foreign governments than we realize.
So in short, if it is an electronic device with a mic and/or a camera, and it connects to the internet, it is spying on us, most likely for the purposes of marketing or espionage.
Any questions? Please put them in the comments below, or just say them out loud or type them into your computer, and we will ask our favorite hackers to pull it off the PRC “third party vendors” to answer them for you. (Kidding! Sort of. . .)
* * * * * *
Piper Bayard is an author and a recovering attorney with a college degree or two. She is also a belly dancer and a former hospice volunteer. She has been working daily with her good friend Jay Holmes for the past decade, learning about foreign affairs, espionage history, and field techniques for the purpose of writing fiction and nonfiction. She currently pens espionage nonfiction and international spy thrillers with Jay Holmes, as well as post-apocalyptic fiction of her own.
Jay Holmes is a 47-year veteran of field espionage operations with experience spanning from the Cold War fight against the Soviets, the East Germans, and the various terrorist organizations they sponsored to the present Global War on Terror. He is unwilling to admit to much more than that. Piper is the public face of their partnership.
Bayard & Holmes share information on espionage history, organizations, firearms of spycraft, tradecraft techniques, honey pots, sleeper agents, the most common foibles of spy fiction, and the personalities and personal challenges of the men and women behind the myths.
Though crafted with advice and specific tips for writers, Spycraft: Essentials is for anyone who wants to learn more about the inner workings of the Shadow World.
Copyright © 2023 Writers In The Storm - All Rights Reserved