Silicon ChipBig Brother is Tracking You! – Part 2 - December 2021 SILICON CHIP
  1. Outer Front Cover
  2. Contents
  3. Publisher's Letter: Making kits is not easy!
  4. Feature: Big Brother is Tracking You! – Part 2 by Dr David Maddison
  5. Project: Hummingbird Audio Amplifier by Phil Prosser
  6. Feature: SMD Soldering – tips and tricks by Tim Blythman
  7. Project: SMD Trainer Board by Tim Blythman
  8. Feature: El Cheapo Modules: 35MHz-4.4GHz Signal Generator by Jim Rowe
  9. Review: Raspberry Pi Pico by Tim Blythman
  10. Project: Digital Lighting Controller Translator by Tim Blythman
  11. Serviceman's Log: A mixed bag of odds, sods, ends and bobs by Dave Thompson
  12. Product Showcase
  13. Project: USB Cable Tester – Part 2 by Tim Blythman
  14. Vintage Radio: Restoring a Sony 5-303E Micro-TV by Dr Hugo Holden
  15. Subscriptions
  16. PartShop
  17. Ask Silicon Chip
  18. Market Centre
  19. Advertising Index
  20. Notes & Errata: Tele-com Intercom, October 2021; Hybrid Lab Supply with WiFi, May & June 2021
  21. Outer Back Cover

This is only a preview of the December 2021 issue of Silicon Chip.

You can view 40 of the 112 pages in the full issue, including the advertisments.

For full access, purchase the issue for $10.00 or subscribe for access to the latest issues.

Articles in this series:
  • Big Brother is Tracking You! – Part 1 (November 2021)
  • Big Brother is Tracking You! – Part 1 (November 2021)
  • Big Brother is Tracking You! – Part 2 (December 2021)
  • Big Brother is Tracking You! – Part 2 (December 2021)
Items relevant to "Hummingbird Audio Amplifier":
  • 4-way Loudspeaker Protector PCB [01101222] (AUD $5.00)
  • The Hummingbird Audio Amplifier PCB [01111211] (AUD $5.00)
  • 6-way Loudspeaker Protector PCB [01101221] (AUD $7.50)
  • Hard-to-get parts for the Hummingbird Amplifier (Component, AUD $15.00)
  • Multi-Channel Speaker Protector PCB patterns (PDF download) [01101221-2] (Free)
  • The Hummingbird Audio Amplifier PCB pattern (PDF download) [01111211] (Free)
Items relevant to "SMD Trainer Board":
  • SMD Trainer PCB [29106211] (AUD $5.00)
  • Kit for the SMD trainer (Component, AUD $20.00)
  • SMD Trainer PCB pattern (PDF download) [29106211] (Free)
Articles in this series:
  • El Cheapo Modules From Asia - Part 1 (October 2016)
  • El Cheapo Modules From Asia - Part 1 (October 2016)
  • El Cheapo Modules From Asia - Part 2 (December 2016)
  • El Cheapo Modules From Asia - Part 2 (December 2016)
  • El Cheapo Modules From Asia - Part 3 (January 2017)
  • El Cheapo Modules From Asia - Part 3 (January 2017)
  • El Cheapo Modules from Asia - Part 4 (February 2017)
  • El Cheapo Modules from Asia - Part 4 (February 2017)
  • El Cheapo Modules, Part 5: LCD module with I²C (March 2017)
  • El Cheapo Modules, Part 5: LCD module with I²C (March 2017)
  • El Cheapo Modules, Part 6: Direct Digital Synthesiser (April 2017)
  • El Cheapo Modules, Part 6: Direct Digital Synthesiser (April 2017)
  • El Cheapo Modules, Part 7: LED Matrix displays (June 2017)
  • El Cheapo Modules, Part 7: LED Matrix displays (June 2017)
  • El Cheapo Modules: Li-ion & LiPo Chargers (August 2017)
  • El Cheapo Modules: Li-ion & LiPo Chargers (August 2017)
  • El Cheapo modules Part 9: AD9850 DDS module (September 2017)
  • El Cheapo modules Part 9: AD9850 DDS module (September 2017)
  • El Cheapo Modules Part 10: GPS receivers (October 2017)
  • El Cheapo Modules Part 10: GPS receivers (October 2017)
  • El Cheapo Modules 11: Pressure/Temperature Sensors (December 2017)
  • El Cheapo Modules 11: Pressure/Temperature Sensors (December 2017)
  • El Cheapo Modules 12: 2.4GHz Wireless Data Modules (January 2018)
  • El Cheapo Modules 12: 2.4GHz Wireless Data Modules (January 2018)
  • El Cheapo Modules 13: sensing motion and moisture (February 2018)
  • El Cheapo Modules 13: sensing motion and moisture (February 2018)
  • El Cheapo Modules 14: Logarithmic RF Detector (March 2018)
  • El Cheapo Modules 14: Logarithmic RF Detector (March 2018)
  • El Cheapo Modules 16: 35-4400MHz frequency generator (May 2018)
  • El Cheapo Modules 16: 35-4400MHz frequency generator (May 2018)
  • El Cheapo Modules 17: 4GHz digital attenuator (June 2018)
  • El Cheapo Modules 17: 4GHz digital attenuator (June 2018)
  • El Cheapo: 500MHz frequency counter and preamp (July 2018)
  • El Cheapo: 500MHz frequency counter and preamp (July 2018)
  • El Cheapo modules Part 19 – Arduino NFC Shield (September 2018)
  • El Cheapo modules Part 19 – Arduino NFC Shield (September 2018)
  • El cheapo modules, part 20: two tiny compass modules (November 2018)
  • El cheapo modules, part 20: two tiny compass modules (November 2018)
  • El cheapo modules, part 21: stamp-sized audio player (December 2018)
  • El cheapo modules, part 21: stamp-sized audio player (December 2018)
  • El Cheapo Modules 22: Stepper Motor Drivers (February 2019)
  • El Cheapo Modules 22: Stepper Motor Drivers (February 2019)
  • El Cheapo Modules 23: Galvanic Skin Response (March 2019)
  • El Cheapo Modules 23: Galvanic Skin Response (March 2019)
  • El Cheapo Modules: Class D amplifier modules (May 2019)
  • El Cheapo Modules: Class D amplifier modules (May 2019)
  • El Cheapo Modules: Long Range (LoRa) Transceivers (June 2019)
  • El Cheapo Modules: Long Range (LoRa) Transceivers (June 2019)
  • El Cheapo Modules: AD584 Precision Voltage References (July 2019)
  • El Cheapo Modules: AD584 Precision Voltage References (July 2019)
  • Three I-O Expanders to give you more control! (November 2019)
  • Three I-O Expanders to give you more control! (November 2019)
  • El Cheapo modules: “Intelligent” 8x8 RGB LED Matrix (January 2020)
  • El Cheapo modules: “Intelligent” 8x8 RGB LED Matrix (January 2020)
  • El Cheapo modules: 8-channel USB Logic Analyser (February 2020)
  • El Cheapo modules: 8-channel USB Logic Analyser (February 2020)
  • New w-i-d-e-b-a-n-d RTL-SDR modules (May 2020)
  • New w-i-d-e-b-a-n-d RTL-SDR modules (May 2020)
  • New w-i-d-e-b-a-n-d RTL-SDR modules, Part 2 (June 2020)
  • New w-i-d-e-b-a-n-d RTL-SDR modules, Part 2 (June 2020)
  • El Cheapo Modules: Mini Digital Volt/Amp Panel Meters (December 2020)
  • El Cheapo Modules: Mini Digital Volt/Amp Panel Meters (December 2020)
  • El Cheapo Modules: Mini Digital AC Panel Meters (January 2021)
  • El Cheapo Modules: Mini Digital AC Panel Meters (January 2021)
  • El Cheapo Modules: LCR-T4 Digital Multi-Tester (February 2021)
  • El Cheapo Modules: LCR-T4 Digital Multi-Tester (February 2021)
  • El Cheapo Modules: USB-PD chargers (July 2021)
  • El Cheapo Modules: USB-PD chargers (July 2021)
  • El Cheapo Modules: USB-PD Triggers (August 2021)
  • El Cheapo Modules: USB-PD Triggers (August 2021)
  • El Cheapo Modules: 3.8GHz Digital Attenuator (October 2021)
  • El Cheapo Modules: 3.8GHz Digital Attenuator (October 2021)
  • El Cheapo Modules: 6GHz Digital Attenuator (November 2021)
  • El Cheapo Modules: 6GHz Digital Attenuator (November 2021)
  • El Cheapo Modules: 35MHz-4.4GHz Signal Generator (December 2021)
  • El Cheapo Modules: 35MHz-4.4GHz Signal Generator (December 2021)
  • El Cheapo Modules: LTDZ Spectrum Analyser (January 2022)
  • El Cheapo Modules: LTDZ Spectrum Analyser (January 2022)
  • Low-noise HF-UHF Amplifiers (February 2022)
  • Low-noise HF-UHF Amplifiers (February 2022)
  • A Gesture Recognition Module (March 2022)
  • A Gesture Recognition Module (March 2022)
  • Air Quality Sensors (May 2022)
  • Air Quality Sensors (May 2022)
  • MOS Air Quality Sensors (June 2022)
  • MOS Air Quality Sensors (June 2022)
  • PAS CO2 Air Quality Sensor (July 2022)
  • PAS CO2 Air Quality Sensor (July 2022)
  • Particulate Matter (PM) Sensors (November 2022)
  • Particulate Matter (PM) Sensors (November 2022)
  • Heart Rate Sensor Module (February 2023)
  • Heart Rate Sensor Module (February 2023)
  • UVM-30A UV Light Sensor (May 2023)
  • UVM-30A UV Light Sensor (May 2023)
  • VL6180X Rangefinding Module (July 2023)
  • VL6180X Rangefinding Module (July 2023)
  • pH Meter Module (September 2023)
  • pH Meter Module (September 2023)
  • 1.3in Monochrome OLED Display (October 2023)
  • 1.3in Monochrome OLED Display (October 2023)
  • 16-bit precision 4-input ADC (November 2023)
  • 16-bit precision 4-input ADC (November 2023)
  • 1-24V USB Power Supply (October 2024)
  • 1-24V USB Power Supply (October 2024)
  • 14-segment, 4-digit LED Display Modules (November 2024)
  • 0.91-inch OLED Screen (November 2024)
  • 0.91-inch OLED Screen (November 2024)
  • 14-segment, 4-digit LED Display Modules (November 2024)
  • The Quason VL6180X laser rangefinder module (January 2025)
  • TCS230 Colour Sensor (January 2025)
  • The Quason VL6180X laser rangefinder module (January 2025)
  • TCS230 Colour Sensor (January 2025)
  • Using Electronic Modules: 1-24V Adjustable USB Power Supply (February 2025)
  • Using Electronic Modules: 1-24V Adjustable USB Power Supply (February 2025)
Items relevant to "Digital Lighting Controller Translator":
  • Flexible Digital Lighting Controller main PCB [16110202] (AUD $20.00)
  • Flexible Digital Lighting Controller Micromite Master PCB [16110201] (AUD $5.00)
  • Flexible Digital Lighting Controller CP2102 Adaptor PCB [16110204] (AUD $2.50)
  • Flexible Digital Lighting Controller LED slave PCB [16110205] (AUD $5.00)
  • PIC16F1705-I/P programmed for the Flexible Digital Lighting Controller [1611020A.HEX] (Programmed Microcontroller, AUD $10.00)
  • PIC32MX170F256B-50I/SP programmed for the Flexible Digital Lighting Controller Micromite master [1611020B.hex] (Programmed Microcontroller, AUD $15.00)
  • PIC16F1455-I/P programmed for the Flexible Digital Lighting Controller WS2812 Slave [16110205.HEX] (Programmed Microcontroller, AUD $10.00)
  • Si8751AB 2.5kV isolated Mosfet driver with integral power supply (Component, AUD $10.00)
  • Micromite LCD BackPack V3 complete kit (Component, AUD $75.00)
  • Hard-to-get parts for the Flexible Digital Lighting Controller (Component, AUD $100.00)
  • Flexible Digital Lighting Controller front panel PCB [16110203] (AUD $20.00)
  • Firmware and software for the Fiexible Digital Lighting Controller (Free)
  • Firmware and PC software for the Digital Lighting Controller [1611010A.HEX] (Free)
  • Flexible Digital Lighting Controller mains slave PCB patterns (PDF download) [16110202-3] (Free)
  • Flexible Digital Lighting Controller Master PCB patterns (PDF download) [16110201, 16110204] (Free)
  • Flexible Digital Lighting Controller LED slave PCB pattern (PDF download) [16110205] (Free)
  • Drilling and cutting diagrams for the Flexible Digital Lighting Controller Micromite master (PDF download) (Panel Artwork, Free)
  • Cutting diagram for the Flexible Digital Lighting Controller mains slave rear panel (PDF download) (Panel Artwork, Free)
  • Cutting diagrams and front panel artwork for the Flexible Digital Lighting Controller LED slave (PDF download) (Free)
  • Digital Lighting Controller Translator PCB [16110206] (AUD $5.00)
  • PIC16F1705-I/P programmed for the Digital Lighting Controller Translator [1611020F.HEX] (Programmed Microcontroller, AUD $10.00)
  • Firmware for the Digital Lighting Controller Translator [1611020F.HEX] (Software, Free)
  • Digital Lighting Controller Translator PCB pattern (PDF download) [16110206] (Free)
  • Drilling/cutting diagrams and lid panel artwork for the Digital Lighting Controller Translator (Free)
Articles in this series:
  • Flexible Digital Lighting Controller, part 1 (October 2020)
  • Flexible Digital Lighting Controller, part 1 (October 2020)
  • Flexible Digital Lighting Controller, part 2 (November 2020)
  • Flexible Digital Lighting Controller, part 2 (November 2020)
  • Flexible Digital Lighting Controller, part 3 (December 2020)
  • Flexible Digital Lighting Controller, part 3 (December 2020)
  • Digital Lighting Controller Translator (December 2021)
  • Digital Lighting Controller Translator (December 2021)
Items relevant to "USB Cable Tester – Part 2":
  • USB Cable Tester main PCB [04108211] (AUD $7.50)
  • PIC16F18877-I/P programmed for the USB Cable Tester [0410821C.HEX] (Programmed Microcontroller, AUD $15.00)
  • Relay - 1A DPDT 5V DC coil (EA2-5NU) (Component, AUD $3.00)
  • IPP80P03P4L-07 high-current P-channel Mosfet (Component, AUD $2.50)
  • Short form kit for the USB Cable Tester (Component, AUD $110.00)
  • USB Cable Tester front panel PCB [04108212] (AUD $5.00)
  • Laser-cut acrylic bezel for USB Cable Tester (PCB, AUD $2.50)
  • Firmware and bezel laser cutting files for the USB Cable Tester [0410821A.HEX] (Software, Free)
  • USB Cable Tester PCB patterns (PDF download) [04108211/2] (Free)
Articles in this series:
  • USB Cable Tester – Part 1 (November 2021)
  • USB Cable Tester – Part 1 (November 2021)
  • USB Cable Tester – Part 2 (December 2021)
  • USB Cable Tester – Part 2 (December 2021)

Purchase a printed copy of this issue for $11.50.

Big Brother is tracking you! Part Two: by Dr David Maddison Our article last month was about all the ways that companies or individuals can track you, both in your online activities and as you move around in real life, using your smartphone or another wireless device. This second part concentrates on the ways that governments monitor their citizens’ activities. Source: https://unsplash.com/photos/9wXvgLMDetA H ere are just a few examples of government surveillance of citizens. Since we “don’t know what we don’t know”, chances are there is a lot more going on behind the scenes. This sort of monitoring can benefit society if used to fight crime or help to fight pandemics, but that relies on proper oversight. Retention of metadata Under Australian law, records of all telephone calls and internet access (although supposedly not recordings of the audio or specific website access) must be kept by telcos and ISPs for a minimum of two years. Text messages are also included, although it’s not clear if the content is also recorded. The following metadata is retained, according to the website at siliconchip. com.au/link/abaf • Your name, address, and billing information • Your phone number or email address, and the phone number or email of the person you’re communicating with • The time, date and duration of a communication 12 Silicon Chip • Your IP address • The location of the communication equipment you use; for example, the closest mobile tower • The type of communication; phone call, text, or email • The amount of data uploaded and downloaded Almost any government department is allowed to access this information. According to the latest available information (2016), 60 departments were included; there are probably many more now. For the 2016 list, see the ABC article at siliconchip.com.au/ link/abag This seems to be a data-mining exercise, collecting data for its own sake, because criminal law enforcement agencies already had access to such data with appropriate warrants. No need for this massive data collection exercise was ever demonstrated. It seems that the main reason that website traffic and browser history was excluded was the vast amount of storage required to do so. During discussions about the new laws, one ISP (iiNet) said that this would require 1000 terabytes per day of storage. Australia’s electronics magazine As much as various politicians and government agencies might want it, recording all phone calls would take considerably more storage. Weeping Angel Weeping Angel is a method devised by the US CIA and British intelligence to listen in on the microphones of smart TVs. It was described in the WikiLeaks “Vault 7” release of March 2017. The logo used for documents under Vault 7: https://wikileaks.org/ciav7p1/ siliconchip.com.au Fig.12: Malte Spitz’s recorded call data as seen at the interactive website siliconchip.com.au/link/abam You can explore the data at that site in various ways. It was collected over ten years ago and seems relatively tame compared to what is collected by both government and big tech firms today. The exploit created a ‘fake off’ mode to make it look like the TV was off, even though the microphone was listening. You can view part of the Weeping Angel user manual and notes at siliconchip.com.au/link/abah It only works with specific models of Samsung TVs. When it was brought to Samsung’s attention, they said they were urgently looking into it. It also required physical access to the TV and the insertion of a USB drive to ‘update’ the TV software/firmware. Also see the video titled “Smart TVs have a surveillance problem” at https:// youtu.be/KxjnjiVF8JE Apps and uses Bluetooth Low Energy to find other contacts within 10m. Several countries use GAEN. Australia does not, instead adopting Singapore’s open-source BlueTrace protocol (https://bluetrace.io/). Australia’s implementation is called COVIDSafe. It is designed to detect contacts that have been within 1.5m of the App user for 15 minutes or more. It is unclear why this App cost $8 million to develop, costs at least $75,000 per month to maintain and has had little use despite 7 million downloads. See siliconchip.com.au/ link/abaj Mass surveillance Electricity usage monitoring While you might not be surprised to hear of massive surveillance in the People’s Republic of China, are you aware that more than 691,000 CCTV cameras operate in London alone? According to US News, nine of the ten most surveilled cities in the world are in China (calculated as most cameras per head of population), but London comes in at number three. See siliconchip.com.au/link/abai Some people grow illegal drugs in suburban houses. The grow lights use a lot of electricity, so they usually bypass the electrical meters to avoid paying the large bills and avoid suspicion. Electricity companies can detect line voltage drops via smart meters around suspect properties, thus revealing the presence of a possible “crop house”. Contact tracing Authorities in Australia regularly monitor sewage to track drug use in various locations. They also look for DNA fragments corresponding to COVID-19 outbreaks. There is no reason they couldn’t or don’t look for other types of DNA either, including that of individuals. In Australia, drug use is monitored Both Apple and Google Android have contact tracing ‘infrastructure’ (the “Exposure Notification Interface” application programming interface [API]) built into the operating systems. This is known as Google/Apple Exposure Notification or GAEN. This API is used by contact tracing siliconchip.com.au by the Australian Criminal Intelligence Organisation under the auspices of the National Wastewater Monitoring program. Around 56% of the population is subject to such monitoring. It is not just restricted to illegal drugs; nicotine and alcohol are included as well. You can read their public reports at siliconchip.com.au/link/abak Location tracking Telcos or governments can determine the location of a mobile phone owner even if the phone is not in use, since a powered-on mobile phone is constantly communicating with nearby towers. At the very least, they will know the phone’s approximate location. Certain technologies allow for more precise triangulation. Sewage monitoring Australia’s electronics magazine The COVIDSafe app is used by the Australian Government for contact tracing. It is based on the Singaporean-developed open source BlueTrace protocol. December 2021  13 4G and 5G telephony can use advanced beamforming so that rather than a mobile tower transmitting omni-directionally, a pencil-like beam is directed to your specific phone. This gives more precise location data than tower triangulation alone. WiFi can also be used to determine the device’s location, as discussed last month. The data collected is used by the government and others. Malte Spitz sued a German phone company about location data his phone company kept on him (see Fig.12). He gave a TED Talk on the subject in 2012, which you can watch at siliconchip. com.au/link/abal Mobile phone data analytics Governments are known to use mobile phone data and analytics for the following pandemic-related purposes: 1. COVID-19 contact tracing with Apps (as mentioned above) 2. Using mobile phone location data Fig.13: movement data provided by Vodafone to the government before and after COVID-19 restrictions and published in the Sydney Morning Herald, 05/04/2020. to monitor individual compliance with movement restrictions 3. Using data analytics to understand the general movements of people during a lockdown 4. Hot spot mapping to analyse the movement of COVID-19 positive people See articles on these subjects in Australia at siliconchip.com.au/link/ aban (Sydney Morning Herald) and siliconchip.com.au/link/abao (AusDroid). The second article is about Vodafone handing over anonymised mobile phone movement data to the Australian government – see Fig.13. Sale of surveillance tools to Australian government According to the 2015 ABC news The fourteen eyes Fourteen Eyes refers to an agreement between the governments of 14 countries: Australia, New Zealand, Canada, the USA, the UK, Germany, France, the Netherlands, Belgium, Italy, Spain, Norway, Sweden and Denmark. The intelligence services of these countries collaborate and share information. The concern over this is that it’s often illegal for an intelligence agency to spy on the citizens of their own countries, as they exist mainly to prevent the operation of spies from overseas, and there is concern that they could abuse their powers otherwise. However, there’s little stopping the intelligence agency of country A from spying on the citizens of country B, then passing their findings on to the government of country A. In fact, there is growing evidence of this sort of activity, especially since the 2013 NSA leaks (see https://w.wiki/3xsV). This is the main reason why we suggest in the article that if you’re looking for secure online services, you look for those hosted outside of this group of countries. Of course, that’s no guarantee that nobody is spying on their services, but it does improve your chances that if someone is spying on the service, they are not passing that information back to members of our own government. Note that in no way does a desire for privacy imply any wrongdoing or intent of wrongdoing any more than does putting an old fashioned letter into an envelope (in most countries). Five Eyes (USA, Canada, UK, Australia, New Zealand) Nine Eyes (France, Netherlands Denmark, Norway) Fourteen Eyes (Germany, Sweden, Belgium, Italy, Spain) 14 Silicon Chip Australia’s electronics magazine siliconchip.com.au article at siliconchip.com.au/link/ abap several companies have tried to sell various spyware and tools to the Australian government. One example is the tool RCS or Remote Control System, it can “siphon off data and listen in on communications before they are encrypted”, and is made by an Italian company called Hacking Team. “Once a computer or mobile phone is infected the tool can read emails, switch on the microphone or camera on the device, identify passwords and record Skype calls”. For more information on RCS, see https://w. wiki/3xtV ECHELON When discussing privacy, the subject of ECHELON comes up frequently. It is a surveillance program operated by Australia, Canada, NZ, the UK and the USA (collectively known as Five Eyes). Its existence is well documented. In 2001, The Guardian reported that ECHELON is “a global network of electronic spy stations that can eavesdrop on telephones, faxes (now obsolete) and computers. It can even track bank accounts. This information is stored in Echelon [sic] computers, which can keep millions of records on individuals. Officially, however, Echelon doesn’t exist.” Theoretically, it is used for military and diplomatic intelligence and not against innocent persons, but there have been claims of abuse. Fig.14: the discontinued L3Harris Technologies StingRay II for interception of mobile phone communications. Source: www.engadget.com/2016-01-28california-secretly-listened-to-cellphone-calls-from-the-air.html ECHELON is said to use voiceto-text technology so keywords and context can easily be automatically determined. Presumably, this is common practice for interceptions done by other government agencies. That is pretty standard technology today. IMSI catchers IMSI (International Mobile Subscriber Identity) catchers are devices used by various law enforcement agencies (and conceivably criminals) that act as a fake mobile phone tower or “cell site simulator”. Thus, surveillance can be undertaken without cooperation from phone companies and with or (potentially illegally) without warrants. They use what is known as a ‘man-in-the-middle’ attack, where a phone user thinks they are connecting to an official, secure mobile phone tower or site, but they are actually connecting to an IMSI Catcher device. The device performs all the normal functions of a phone tower, but with the added “feature” of data collection. StingRay (see Figs.14 & 15) was a particular brand of IMSI catcher made by the US company now known as L3Harris Technologies. However, they discontinued sales and support of StingRay in June 2020. See the videos titled “The Stingray: How Law Enforcement Can Track Your Every Move” at https://youtu. be/wzSgLpNrr2E and “How Stingray technology works” at https://youtu.be/ HyONknZ_x_g Fig.15: a page from the manual of a nowobsolete StingRay, released online. You can find copies of the manual if you search for it. siliconchip.com.au Australia’s electronics magazine December 2021  15 L3Harris also made products such as Kingfish (a hand-carried version of StingRay), Harpoon (a device to enhance the capability of the StingRay), Amberjack, Arrowhead and Hailstorm. Apparently, a popular replacement for the L3Harris StingRay is the Octasic Nyxcell V800 PBU/F800 TAU. Many US Government departments have online contract bids to acquire this device (no picture is freely available). Other manufacturers of IMSI catcher devices include: • Ability Computers and Software Industries (Atos) • Boeing subsidiary Digital Receiver Technology’s ‘DRT’ devices (hence another name for these devices, “dirt boxes”) • Datong (Seven Technologies Group) • Gamma Group • Martone Radio Technology • Meganet Corporation • Octasic • PKI Electronic Intelligence • Rayzone • Rohde & Schwarz • Septier Communication These devices have been in use for decades. Information that they can collect includes: • A phone’s location • The IMSI or ESN (electronic serial number, a 32-bit number embedded in a wireless phone and also printed on it) and other identification details • Call metadata, such as who is being called and the duration • The content of voice calls and text messages • Websites visited They can also be configured to divert calls and text messages, edit text messages and spoof the identity of the origin of text messages and voice calls. These devices can also collect all phone IDs in a geofenced area. There is a PDF report about the extensive use or overuse of IMSI catchers in Canada and abroad: siliconchip. com.au/link/abaq In that report, some of the uses for these devices are quoted as follows: • Confirming the presence of a device in a target’s home before a search • Identifying an individual responsible for sending harassing text messages • Locating a stolen mobile device as a precursor to searching homes in the vicinity • Locating specific individuals by driving around a city until a known IMSI is found • Mounted on aeroplanes to allow the United States Marshall Service to sweep entire cities for a specific mobile device • To monitor all devices within range of a prison to determine whether prisoners are using mobile phones • Reportedly at political protests to identify devices of individuals attending • To monitor activity in the offices of an independent Irish police oversight body Operation Ironside, arresting criminals & Australia’s lack of privacy laws The story of Operation Ironside is a good illustration of how government surveillance can prevent crime and also how poor Australia’s privacy laws (and civil liberties in general) are compared to other democratic countries. The story begins in 2018 when an informant for the US Federal Bureau of Investigation (FBI) developed smartphone software called AN0M which supposedly provided anonymous, encrypted communications. It was quickly adopted by various criminal operations (see https://w.wiki/3xsU for more details). The informant supplied communications data to the FBI, who then shared it with the Australian Federal Police. This led to almost 300 arrests in Australia and over 800 worldwide. Many of the charges had to do with the importation and distribution of banned drugs, although apparently at least one murder plot was uncovered by the operation. The interesting part is that, despite there being many AN0M users in the USA, no arrests were made there as much of the ‘overheard’ messages would not be admissible in court as evidence, as that would require warrants to be issued approving the eavesdropping. For those warrants to be issued, there would have to be a valid reason to suspect the surveilled individuals were involved in criminal activity. It appears that Australian authorities do not have to operate under such strict rules. According to the ABC article at siliconchip.com.au/link/abb4, this is because Australia’s privacy laws are amongst the weakest of any democracy. As stated in that article, “… innocent parties’ data could be obtained, stored and used in ways that they would never have foreseen”. If there is just one lesson to take away from Operation Ironside, it’s that you can’t trust unknown third parties to uphold your privacy. If an App or service claims to be anonymous or encrypted, absent laws ensuring those things being true, you should assume they aren’t. And even if such laws do exist, those services could operate overseas, outside those jurisdictions. So you clearly need to know whom to trust. In fact, based on the information recently revealed by the Australian Federal Government at siliconchip. com.au/link/abb5, the Australian government will have even more power to monitor online activity. The various logos used in Operation Ironside (also known as Operation Trojan Shield), from leftto-right you have: ANOM’s app logo (AN0M or ANØM), the AFP’s logo for the operation and the FBI’s logo for the operation. See https://en.wikipedia.org/wiki/ANOM 16 Silicon Chip Australia’s electronics magazine siliconchip.com.au See also the comprehensive video titled “Catching IMSI Catchers” at https://youtu.be/eivHO1OzF5E In that video, it is stated that for US$1400, it is possible to build your own IMSI catcher, and while this is documented publicly, we don’t suggest you do as it is certainly illegal. However, it is clear that criminals could make their own IMSI capture devices. Further details on IMSI catchers can be found on the EFF’s website: siliconchip.com.au/link/abb6 Tower “dumps” As reported in the Sydney Morning Herald at siliconchip.com.au/link/ abas, Australian authorities use tower “dumps” to track criminals. A tower dump provides the “identity, activity and location of any phone that connects to targeted cell towers over a set span of time”. Old-fashioned listening at the exchange The Author recalls how the introduction of GSM (2G) to Australia in 1993 was delayed by about a year because the exchange equipment had to be modified to ensure authorities could intercept any conversation at will. This is despite the same exchange equipment being accepted in other countries, which therefore introduced GSM earlier. There is a contemporary article in the Australian Financial Review on this, at siliconchip.com.au/link/ab3d No doubt, this capability still exists and likely has been enhanced now. as the Australian Taxation Office or Australian Electoral Commission, according to www.passports.gov.au/ protecting-your-privacy but presumably any other agency that wants them can get them, including foreign governments in some cases. License and passport photos Finding patterns in aerial or satellite imagery Governments routinely digitise drivers’ licences and passport photos and put them in databases so, like it or not, your picture is in a national database. That means that you can be automatically recognised and tracked by camera systems with access to that database. Australian governments employ extensive facial recognition systems within a National Facial Biometric Matching Capability. Services include the Face Verification Service (FVS), the Face Identification Service (FIS), the National Driver Licence Facial Recognition Solution (NDLFRS) and “Other Face Matching Services may be added over time”. For more information on this, see the Australian government (OAIC) website at siliconchip.com.au/link/ abat Australian passport photos can also be shared among other agencies such Terrapattern was a project of The Frank-Ratchye STUDIO for Creative Inquiry with the purpose of matching patterns in satellite images. An image such as a tennis court is selected, then all similar-looking tennis courts from the satellite imagery database are found. The software uses a Deep Convolutional Neural Net (DCNN) to assist with image recognition. We are unaware of this project still being active. See Fig.16 and the video titled “Terrapattern (Overview & Demo)” at https://youtu.be/VHv5W7Ei80s An example of use for financial or state-based intelligence is finding and examining all images of oil storage tanks. As the oil level changes, so does the floating roof of the tank. By examining the shadows cast, it is possible to determine the oil levels of tanks in a particular region, which could influSC ence the price. Fig.16: a Terrapattern search of objects in satellite imagery that look like oil tanks to determine oil level from shadows. This is a screengrab from the YouTube video at https://youtu.be/VHv5W7Ei80s siliconchip.com.au Australia’s electronics magazine December 2021  17