Not so long ago, old-time spy Secret Agent Man could globe-hop with impunity (sing-a-long) and hide with undercover diplomatic immunity. Now, he may as well wear the Scarlet Letter “A”, for Agent.
WTF happened? Quite a bit…
9/11, for one. It’s not so easy to fly under the radar these days.
In 2014, U.S. spies were exposed when the Office of Personnel Management was hacked. About 22 million fingerprints, security clearance background information, and personnel records allegedly fell into Chinese hands. In 2015 it happened again.
One can be fairly sure this isn’t just a problem for U.S. spies. Other countries get hacked, too. You just don’t hear about it.
If all this wasn’t bad enough, an old-time spy’s best friend turned on him in the 2000’s. Technology.
The latest advancement is analysis of video streams using artificial intelligence logarithms. Suspicious movements, packages left unattended, predictions of future movements and crimes are analyzed by mindless machines 24/7, waiting to trigger an alert.
On the communications side spyware is a concern. Smartphone and GPS tracking don’t help the old-time spies hide either.
It has been reported that some countries are compiling real-time databases which incorporate the above-mentioned speed bumps with: taxis, hotel, train, airline, credit card, customs and immigration information. As soon as one enters the country, they know where you are—minute by minute. And, if one takes too long going between locations, or a dual timeline appears (being in different places at the same time), a security alert is generated.
Couple all this with countries sharing information instantaneously, e.g. EU, and being one of the old-time spies making in-person contacts nearly impossible.
Think staying out of view is a good spy strategy? For now, perhaps. However, progress is being made by constructing a person’s face by the sound of their voice.
The future of spying (no, it won’t go away) will be radically different out of necessity. One can only guess how, but we understand they are working very hard on mind-reading.
Feel free to leave your guesses in the Submit Comment section. Be seeing you.
###
Murray Associates is an independent security consulting firm, providing eavesdropping detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.