Copyright: 1996 - 2024
BSEE - KB3UON
RF Cafe began life in 1996 as "RF Tools" in an AOL screen name web space totaling
2 MB. Its primary purpose was to provide me with ready access to commonly needed
formulas and reference material while performing my work as an RF system and circuit
design engineer. The World Wide Web (Internet) was largely an unknown entity at
the time and bandwidth was a scarce commodity. Dial-up modems blazed along at 14.4 kbps
while typing up your telephone line, and a nice lady's voice announced "You've Got
Mail" when a new message arrived...
All trademarks, copyrights, patents, and other rights of ownership to images
and text used on the RF Cafe website are hereby acknowledged.
My Hobby Website:
The Law of Unintended Consequences
The Law of Unintended Consequences
“Give him enough
rope and he'll hang himself.” That is a line often directed toward someone who is
engaging in nefarious activities without realizing he is being monitored and abetted
in seeing to it that he orchestrates his own downfall. Sometimes, though, well-meaning
folks unwittingly are accomplices to their own adversity. If you are an engineer,
technician, manager, or salesman who has participated in the development and/or
deployment of wireless technology, you may have already set the stage for your personal
You know you are being watched, right? Constantly, right? Cameras
in bank lobbies and clothing stores have been around seemingly forever to record
archival data in case it is needed later in the pursuit and/or prosecution of a
perp. Technology evolution then gave us more ubiquitous wireless video surveillance
that performs 24/7 sentry duty in the Wal-Mart parking lot, on schoolyard playgrounds,
at busy road intersections, and in high crime areas of urban neighborhoods. We hardly
noticed its evolution, mainly because viewing of the records was limited largely
to those responsible for security.
Then, along came the Internet and all
restraints for invasion of privacy were removed. Take a walk along the beach, stroll
downtown on the sidewalk past the bakery or pizzeria, cruise an interstate highway
through a metropolitan area, withdraw money from an ATM, or even go to the zoo,
and there is a good chance that somebody will (or at least could) see you in real
time while sitting in front of a computer. More than a few people have been unpleasantly
surprised to find videos or still shots of themselves turn up on websites like YouTube.
There is nowhere to hide, it seems, if you are to go about your life in a “normal”
manner. There could easily be dozens or hundreds of images recorded of you in your
travels - anywhere in the world. Far from being merely the contrived imagination
of a helpless paranoid, this is a very real phenomenon.
It gets worse. RFID
and other wireless reporting systems now make not only seeing you, but tracking
your movements and habits even simpler. I have linked to many headlines over the
years that tell the story of criminals being tracked down and apprehended through
the assimilation of data from recording and tracking devices spread over sometimes
very wide regions. With relatively little effort, law enforcement can subpoena camera
and electronic recordings from any and all sources that lie within an area of interest.
Agents can utilize the cellular telephone networks and lately WiFi nets to track
your path from point to point if you are using those services while on the move.
That GPS receiver in your phone or laptop is especially appreciated because it provides
much greater precision than does triangulation off of multiple cell towers or access
points (there is more to the mandate for E911 than just finding you if you've fallen
and you can't get up). Keep in mind that your cell phone is in nearly constant communication
with the network even when you are not talking with someone - it just needs to be
turned on. Zipping through the E-ZPass toll booths provides not only a simple digital
record of your having been there, but a snapshot of you as well just in case it
is needed later - remember to smile on the way through.
You are not a criminal,
though, so you have nothing to worry about. Don't be so sure. The OnStar system
in GM vehicles has provided unwelcome evidence in more than one civil court action.
Wives have hired lawyers who have obtained subpoenas to obtain information on the
whereabouts of their cheating husbands at clubs, motels, or other places they should
not have been. Husbands have taken the same action against their wives. Guess what?
Your cell phone can provide a lot of the same information - dates, times, and locations
(at least from which cell area). The standard computer in your car is constantly
filling a buffer with information about your driving speed, acceleration, and braking.
Police accident investigators routinely do a data dump at the scene for information
that can and will be used in court against you (or in your favor if you are lucky).
Credit card swipes, which all feed back into a central collection database, are
prime targets for use in mounting a prosecution against you.
Are you worried
yet? Have you done something that now you are a little concerned that somebody,
somewhere has recorded it, but at least so far has no reason to use it against you?
Have you been to any "questionable" websites lately, or maybe on a regular basis?
Do you use an online alias under the erroneous assumption that no one really knows
who you are? Don't count on it. Do you post anonymously on forums and blogs, or
do a little bit of online gambling, all the while being confident that it is just
your little secret? Unless you are a true black hat operator, you are not fooling
anyone. Your tracks are sitting on your computer, in worldwide web routers, in your
employer's nightly tape backup, maybe on your flash drive, and any number of other
places. Maybe it's time to do a total system restore with a hard drive format, but
even that can be "undone" if investigators know what they are searching for. Maybe
you should just buy a new computer and trash the old one; that way all traces are
gone - like melting down the murder weapon.
Now we have people volunteering
to have RFID chips implanted, similar to the ones the animal shelter injects into
adopted cats and dogs. In February of this year (2008), a New Jersey policeman became
the first reported case of a person being saved due to having an RFID tag implant
with his medical history in it. Given enough time, maybe through force as a part
being eligible for treatment under the seemingly inevitable socialized health care
system that is coming to America (and already implemented in most other countries),
we might all be sporting an RFID chip. Operational ranges for the devices are increasing
all the time so that a near field scan will no longer be necessary. That means setting
up monitoring points as an integral part of store checkout lines, taxi cab meters,
bus and train portals, vending machines, parking meters, and bathrooms, not to mention
the other locations previously mentioned. The difference is that now you can personally
be associated with buying those cigarettes even though you use cash, or maybe it
will be a couple Snickers bars when you are a diagnosed diabetic. Wait until your
government-assigned physician learns about that! Undergoing therapy for a gambling
addiction and trying to buy a lottery ticket or a deck of cards? You're busted!
Trying to buy more gasoline than your personal carbon footprint quota allows for?
Who can you blame for what exists now and what is being developed
for the future? Why, maybe that trite old saying about three fingers pointing back
at yourself when pointing the index finger at someone else really does have some
merit. After all, as I stated in the beginning, if you have in any way helped to
develop or deploy the technology, you have essentially given up your right to abstain
from self-incrimination in a court of law. Nice going.
That Cell Phone In Your Hand Is A Tracking Device
Chips: High-Tech Aids or Tools for Big Brother?
Using E-ZPass to Expose Adulterous Spouses
New Jersey Motorcycle Officer Loses Leg Following Crash
Posted March 6, 2008