Top 5 Ways You Are Spied On Every Day And Don’t Know It

Ryan Dube 19-12-2014

You walk into the supermarket, and the camera on the ceiling sends your face to the corporate mainframe for facial recognition 5 Fascinating Search Engines That Search for Faces There are search engines that can find someone from their photo. Here are several face recognition search engines to try. Read More analysis. You log into Facebook, and a key logger on your computer emails your password to a covert security building inside of Beijing. Do these sound like scenes from a movie? Believe it or not, they could be happening to you every day.


Many people are oblivious to the ways in which they are monitored nearly every day, in some aspect of their lives. It might be while conducting business at a store, getting money out of an ATM, or even just talking on their cellphone while walking down a city street.

The first step to protecting yourself is understanding the biggest surveillance threats that actually exist. The next step is taking precautions to protect yourself against them. In this article, you’ll learn about those surveillance threats, and some ways to safeguard against them.

Facial Recognition

The first inklings that something was amiss in the world of consumer surveillance came in November of 2013, when the Guardian reported that the UK retailer Tesco was installing advanced face-scanning technology called OptimEyes, for marketing purposes.

The intent of the system went far beyond the typical security cameras AtHome Camera Free: Turn Any Computer Into A Security Cam With Your iPhone Read More you may find in stores. Instead, it was to scan the eyes of petrol customers to determine age and gender for the purpose of delivering targeted ads to the screens installed in the petrol stations.

The use of such technology has only expanded. Companies like Face First offer surveillance technologies to retailers that use advanced facial recognition technology to identify known shoplifters and alert store managers to their presence. The technology is also used to recognized known repeat “good” customers, so that they can receive VIP treatment – making sure they return to the store in the future.


For retailers this technology is promising, but it’s a disturbing privacy concern to consumer and privacy rights advocates. As far back as 2012, when this was initially coming to maturity, the Consumers Union issued an open letter to the Federal Trade Commission (FTC), advising the agency that the technology – while immensely useful for the retail and advertising industries – could pose very serious privacy issues for consumers.

“The ubiquitous installation of facial recognition devices in malls, supermarkets, schools, doctor’s offices and city sidewalks could seriously undermine individual’s desire and expectation for anonymity.”

The Consumers Union pointed out that such technology targeting children could make the current youth obesity epidemic worse, and targeting teens with weight-loss products could make adolescent self-esteem issues worse. The most serious issue is the fact that there are no guidelines preventing companies from collecting and storing such surveillance information about you and your purchasing behaviors.

“Facial detection and recognition software could offer consumers a number of tangible benefits. At the same time, we cannot ignore the fact that these technologies pose significant privacy risks and seriously threaten consumers’ right to anonymity.”


The next time you’re going shopping, keep an eye out for those overhead cameras tracking your every move!

Webcam Hacking

In May of 2014, U.S. officials arrested 90 people who were part of an organization known as “Blackshades”. Blackshades produced and sold software that let hackers connect into any computer running Microsoft Windows and take control of the webcam. One college student was even arrested for using the software to capture nude photos of Miss Teen USA.

If  you’re wondering whether you should be concerned, consider the fact that the organization sold thousands of copies totaling $350,000 of sales, with an estimated 700,000 victims across 100 countries since 2010. Yes, it really is possible for someone to hack your webcam, as James recently explained How Easy Is It For Someone To Hack Your Webcam? Read More .



The scary part of the software is that it isn’t just the webcam that’s susceptible. Hackers get access to keystrokes and passwords, they can take screenshots, and they can access your computer files. The only safety that might set your mind at ease is the fact that victims need to be tricked into actually clicking on a malicious link that installs the offending software. If you’re clever enough at identifying phishing emails, and you avoid clicking on suspicious web links, you may be able to keep yourself safe from this particular threat.

Sounds simple to keep yourself safe right? Well, think again.

In December of 2014, Telegraph writer Sophie Curtis asked her “ethical hacker” friend John Yeo, an employee of Trustwave, to try and hack into her computer. The hackers worked tirelessly to learn as much as they could about Sophie online, and eventually crafted phony emails that fooled Sophie into clicking – immediately infecting her laptop and giving hackers access to everything, including her webcam.  Even people who believe they are immune to such tactics can be fooled.

Fake Cell Towers

In September of 2014, rumors started surfacing about so-called “fake cell towers” suspected of intercepting cellphone communications around the country. These towers were confirmed by investigator Aaron Turner, also the owner of mobile security firm Integricell.


Aaron Turner told The Blaze that the odd towers were set up to literally trick cellphones into thinking that the fake tower was the only available tower in the local area.

“These towers are tricking your phone into saying ‘I need to talk 9-1-1 information to you,’ but then it doesn’t.”

According to Turner, the towers – concentrated heavily in Pennsylvania and downtown Washington D.C. – could literally “break open your communications” and see what’s going on with the phone.


Multiple other investigators confirmed “encounters” with fake cell towers – yet no actual photos surfaced of any real cell towers in any specific location. There were questions as to whether the odd “interceptor” towers were yet another arm of a wide-reaching federal surveillance program already under steady public criticism. Others suspected that the towers could be part of an international espionage program.

It wasn’t until two months later, in November that the Wall Street Journal broke the news that the Department of Justice – essentially police authorities across the nation – were actually placing fake mobile phone “towers” on airplanes through the use of a device called a DRTBOX, nicknamed a “dirtbox”. Made by Digital Receiver Technology (a subsidiary of Boeing), the device looks like a cell tower to mobile phones, and performs a “middle man attack” to extract registration information from those phones.

Authorities were flying those planes around metropolitan areas in order to scoop up as much cell phone information as possible.

“Planes are equipped with devices—some known as ‘dirtboxes’ to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.”

Identifying a person’s cellphone “identity” and location information would allow law-enforcement to locate and track pretty much any citizen with a cellphone.  The American Civil Liberties Union (ACLU) sifted through publicly available documents on the use of these “Stingray” devices by state and local police, and published a map showing where the devices are currently in use.



As technology advances faster than the laws can keep up, authorities are taking full advantage of loopholes to collect as much data as possible. You can learn more about these efforts and the efforts to keep them concealed at the ACLU investigation page.  If you live in any of the colored areas on the map, the chances are your cellphone data and location has been collected by local or state law enforcement.

China Cyberwar Hacking

If you think that only your own government is spying on you, think again. In late October of 2014, the Washington Post announced that a security research team had identified a sophisticated Chinese cyberespionage group called “Axiom” that was targeting western government agencies in a bid to gather any intelligence surrounding Chinese domestic and international policies.

In mid-October, before the publication of the Washington Post, the FBI had actually issued a warning to U.S. industry, to be alert of an advanced Chinese hacker group running a campaign to collect sensitive and proprietary information from U.S. companies and government agencies.


According to the FBI, the new group is a second state-sponsored unit, following the earlier disclosure by security experts of another government hacking unit called People’s Liberation Army Unit 61398. The Axiom group has been operating for at least four years, specifically targeting industrial and economic interests in Western countries.

The important thing to understand here is that if you work for a major corporation that has well-protected proprietary secrets, you may very well be targeted by the Axiom group. It deploys what are known as “zero-day exploits” of Microsoft’s Windows operating system – one of the more difficult and advanced hacking techniques. By infiltrating a company or government agency through the computer of any single employee, the group can attempt to gain access to network or system access, and potentially gain access to sensitive and valuable industrial secrets.

Don’t think that your computer is a valuable target for these hackers? It is. So work with your corporate security group and make sure to take security rules and policies seriously.

Industrial Espionage at Business Conferences

Your company decides to send you to this year’s industry conference. Maybe it’s CES or some other really cool tech conference. Packing up your things for the trip, you remember to bring your work laptop, company supplied cellphone, and of course a memory stick containing some of your most important files from work. Most people, in their excitement about taking a business trip and seeing so many cool technologies, never for a moment consider that they may be putting their own company’s competitive advantage in the marketplace at risk.

How so? By not properly security company laptops, mobile phones and data while traveling. International espionage groups know that travel is when company employees are most vulnerable, and so conferences are a major target for industrial intelligence collection.


There are so many security weak points when you’re traveling and attending a conference, so it’s important to keep all of these in mind, and take appropriate action to protect yourself before you end up a victim of industrial espionage.

In 2014, Carl Roper wrote a book titled “Trade Secret Theft, Industrial Espionage, and the China Threat”, where he explained that some Chinese industrial espionage efforts actually focus on gathering technical information from openly available presentations at conferences.

“Conferences with such subject areas as composite materials, missiles, engineers, lasers, computers, marine technology, space, microelectronics, chemical engineering, radars, armaments, and optical communications are just some of the more interesting ones that the Chinese will try to attend. Data from these types of conferences will be among the most significant contributions to their projects.”

It’s debatable whether information provided in a public conference presentation may provide espionage agents with trade secrets, however poorly scrubbed (or completely uncensored) presentations are very likely to accidentally reveal very big clues about a corporation’s trade secrets.

Thankfully, there are ways to protect yourself. If you are giving a presentation for your company, always pass the presentation to your company’s Communications Department or the Legal Department. Some companies may even require that all external communications get approved by either or both departments. Don’t forget to do this, or it could very well cost you your job.

Kihara recently provided  an extensive list of additional tips and safeguards you can use to protect yourself from illegal spying How to Protect Yourself From Unethical or Illegal Spying Think that someone is spying on you? Here's how to find out if spyware is on your PC or mobile device, and how to remove it. Read More . Well worth a read.

Be Aware, But Don’t Obsess

Being aware of all of the ways you are being spied on every day doesn’t mean that you have to constantly worry about who is listening to you, reading your emails or tracking your location. What it does mean is that you should always be aware of your surroundings, and how you are using technology when transmitting information that you actually consider to be either sensitive or very personal.

There are plenty of ways to evade surveillance attempts – even attempts by your own government – by using encrypted resources when you’re dealing with sensitive information, or simply beefing up your computer’s security environment 5 Best Tips to Prevent Someone From Watching You When Downloading Torrents Read More in a big way.

But once you’ve put all of your safeguards in place, stop worrying. Life your life, comfortable in the knowledge that you’ve taken the appropriate steps to protect yourself.

Duc Dao via Shutterstock, Matej Kastelic via Shutterstock

Related topics: Face Recognition, Online Privacy.

Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.

Whatsapp Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. DevilDog13
    December 23, 2014 at 4:12 pm

    I saw no mention of the Google purchase of SkyBox?
    What is creepier - their ability to see the mole on the back of your neck from outer space? or beaming the internet to 4.6 billion people across the planet? So your android phone can always stay in touch to let them know exactly where you are. You will need to live on the moon to be out of their "Skynet" grasp. Usher in the terminators!

  2. Julio
    December 23, 2014 at 2:05 pm

    That remember me a TV Show called "Person of interest", if you know how much the companies spy us, just watch this show..

  3. Andrew Jordan
    December 23, 2014 at 2:27 am

    You missed a couple you don't think about.Supermarket loyalty cards record your every purchase, WalkMart collects more information than probably the IRS does. Finally the new license plate number readers that are being introduced ( already used in the UK. They batch read every license plate from a camera in front of the car. Thereby having a record of all the people in a given area and time. We are not being told who this information is being shared with and how long it will be the UK they automatically pick up and report for prosecution any expired registrations or insurance.

  4. nusuntel
    December 23, 2014 at 12:07 am

    *Live your life, in the last sentence.

  5. Godel
    December 22, 2014 at 11:48 pm

    Here's another frightening little goodie. Do a search on SOHO Router Security, and read some of the stuff that comes up.

    Here's just two links:

    The Person Of Interest TV show is actually a documentary. :-(

  6. Chahk noir
    December 19, 2014 at 5:23 pm

    "Life your life..."

    Doing this as hard as I can.

  7. Rob
    December 19, 2014 at 3:32 pm

    Nice article, Ryan! The fake cell phone towers sound pretty messed up. Going to try to find out more about these now- any idea if they're used in the UK?

    • g
      December 26, 2014 at 1:12 am

      ESD American is the company that actually caught the use of fake cell towers. This article should help you get a jump on your research.

  8. bben
    December 19, 2014 at 1:30 pm

    You left out social networks - even a non hacker can learn a LOT about a person based on what they find posted on various not very secure social networks. Then a real hacker with social engineering skills can pick up from there and learn a lot more. Don't believe it - Google yourself and see what comes up.

    Watch out for friend requests from old buddies you haven't heard from in years - "Hey buddy, this is Frank from a long time ago." and you may just allow him because you probably do know a 'Frank' from a long time ago. And 'Frank' may have more corroborating stuff to verify who he is that he has already gleaned from your own unsecured info on some other social site or from some of your less security minded friends.

  9. dragonmouth
    December 19, 2014 at 1:28 pm

    "Many people are oblivious to the ways in which they are monitored nearly every day,"
    Oblivious? Or maybe just resigned to the reality. And it will only get worse because we, the sheeple, have no recourse. The very entities that should protect us are the ones that are surveilling us. Did you ever notice that any time the governement (at any level) wants to deprive us of our civil rights, it always justifies itself by claiming that the action will "protect us from terrorism" or "protect our children"? Pretty soon we might as well start living in glass houses for all the privacy the walls provide us.

    One good thing about governmental surveillance and data collection is that there are statutes that supposedly control their use. There are no similar statutes controlling surveillance and data collection by private entities.

    "It deploys what are known as “zero-day exploits” of Microsoft’s Windows operating system"
    This has been going on since Windows was introduced. I am surprised that companies and governments across the world are still using Windows O/S. If it was a piece of equipment that kept on failing this often, everybody would quit buying it. If the use of Windows fell 75%-80%, corporate and personal data would be much safer, and Microsoft would be forced to re-write Windows code to make it much more secure. As it is, as long as M$ sells hundreds of millions of copies of Windows each year, there is no incentive for them to properly secure their software.

    Yes, there will be a cost to switching from Windows to another, more secure, O/S. But there is also a cost of industrial espionage. In the end the companies have to figure out what affects the bottom line more, the cost of switching O/Ss or the losses from industrial espionage.

    "There are plenty of ways to evade surveillance attempts"
    Not when there are cameras on almost every corner and every tolls booth of any kind. Not when each business establishment has multiple cameras. Not when every electronic device has GPS incorporated into it. Even tin foil hats do not help anymore. :-)

  10. KT
    December 19, 2014 at 12:25 pm

    Great article. We're definitely living in Orwellian times. You could add to that all the self inflicted surveillance people do on social media and irresponsible tech practices.

  11. Arpit Kharbanda
    December 19, 2014 at 12:12 pm

    Thanks Ryan For This Article.