Service providers other than mobile network operators can provide information about you to an adversary.
Physical and digital stores can provide information about purchases made through the store, including:
- Given a name: the items purchased under that name, as well as the dates of the purchases.
- Given an item or category of items: the names of the people who purchased the item, as well as the dates of the purchases.
Additionally, physical stores can provide:
- CCTV footage from cameras operated by the store.
- Testimony from store employees, for example about the physical appearance of a person who made a particular purchase.
Banks can provide:
- Your bank account activity, including the date, location and amount of any purchase or withdrawal you make with a card.
- CCTV footage from cameras on Automated Teller Machines (ATMs).
Internet service providers can provide:
- If you follow digital best practices and use Tor: metadata about your Internet activity, such as when you use Internet.
- If you don't use Tor: your Internet activity, including the list of websites you visit.
Websites, email providers, and other online services can provide:
- The content of unencrypted communications you make through the service (e.g. social media posts, unencrypted emails).
- Metadata about encrypted communications you make through the service (e.g. the sender, recipient, and date of encrypted emails).
Postal services can allow an adversary to monitor your mail.
State institutions can provide any information they have about you, including your address, tax records, health information, etc.
Used in tactics: Incrimination
Mitigations
Name | Description |
---|---|
Anonymous purchases | If you need to purchase an item in a store, you can purchase it anonymously to make it harder for an adversary to use the collaboration of the store to link your identity to the item. |
Digital best practices | You can follow digital best practices to make it harder for service providers to provide useful information to an adversary. For example, you can:
|
Encryption | You can encrypt “in-motion” data to make it harder for service providers to provide useful information to an adversary. |
Used in repressive operations
Name | Description |
---|---|
Case against Louna | Investigators used the collaboration of the hospital to:
Investigators also used the collaboration of several State institutions:
Investigators used the collaboration of several companies:
Investigators asked a social housing landlord and a real estate agency to provide them with access cards to apartment buildings. |
Case against Peppy and Krystal | A fireworks store provided investigators with records showing that Peppy had purchased fireworks from the store three days before the protest.[7] |
Repression of Lafarge factory sabotage | Investigators gave the serial number of a camera to the camera manufacturer, and the manufacturer gave them the name of the store where the camera was sold.[8] This helped investigators identify a person they accused of taking photos with the camera. |
Case against Boris | Investigators used the collaboration of an email provider to gain real-time access to an email address used by Boris: they were able to see emails sent and received in real time. |
Repression against Zündlumpen | Investigators used the collaboration of banks to:[9]
Investigators asked several companies to provide information about a person:
|
Bure criminal association case | Investigators used the collaboration of banks to obtain the bank records of organizations fighting against Cigéo.[3] The bank records of one organization included a 500€ transfer entitled “participation manif 18 fev” (“contribution to the February 18 demonstration”), in reference to a demonstration in which people attacked a building associated with Cigéo. The owner of a supermarket in a town about 20 km from Bure told investigators that he had seen customers buying an unusually large amount of denatured alcohol (15 liters), and gave the receipt to the investigators. |
Private source.
An International Mobile Subscriber Identity (IMSI) number is a number that uniquely identifies a SIM card.
An International Mobile Equipment Identity (IMEI) number is a number that uniquely identifies a phone.