[Cryptography] Ranking what draws surveillance attention

Kent Borg kentborg at borg.org
Mon Feb 16 10:26:59 EST 2026


I'm a nobody, but I once drew personalized, physical attention of some 
Chinese internal state security organization.


At the time I worked for a company that did avionics for small aircraft. 
I have always been interested in security and practice pretty careful 
security myself, more as a thought exercise than for real reasons. I 
caught their attention.

My wife and I were on a trip to China over the holidays, 2008 to 2009. A 
couple-ish weeks, traveling alone, not on a tour. This was before the 
Great Firewall was so robust, and I brought my Linux computer with me. I 
could use the wifi in tourist hotels. When I did use the wifi it was for 
web stuff, and also encrypted connections (SSH, I suspect also IMAP at 
that point) to my personal server at home, on a static IP address, in 
the USA. This was before the "only bring disposable electronics to 
China"-rule, but I kept my computer with me at all times. Almost.

I also brought my handheld GPS hiking receiver with me and used it a 
lot, because I like my toys. (The embedded Garmin maps of China seemed 
to always about a ¼-mile offset from reality.) I most likely had a tiny 
shortwave radio with me, too. A Sony SW-1, or more likely the fancier 
Sony SW-100, both very nice little radios. We took a lot of pictures, 
too, because "film" (flash memory) was suddenly so cheap!

Very early in the trip I was attacked by an evil bowl of soup at dinner 
and was quite sick for a few days, holed up in our hotel room in the 
French Quarter of Shanghai, my wife was out and about, bringing me back 
some simple foods that she hoped wouldn't make me worse.

We were in Hangzhou and West Lake over Christmas where, as the only 
foreigners (only intelligence targets?) at the hotel's Christmas dinner 
event, we were treated like celebrities. I remember being up on stage at 
one point, my wife, too. Though I would have carried the silver 
"Bubbleope" the computer was in with me, like a woman's clutch. Or, 
maybe not. Maybe I left my computer and my "purse" with my wife, but 
then she got called up later and it was left alone for a couple minutes. 
Not enough time to tamper with my computer, but enough time to mess with 
my purse.

After our visit to Xian to see the Terracotta Warriors we returned to 
Shanghai, and one sight that was still a must-see on our list was their 
fabulous archeology museum. But they wouldn't let me bring in my 
computer in. I had to check it.


[Wonderful museum. In galleries with delicate scrolls the light on the 
art would be kept extremely dim if no one was in the room, but when we 
entered the lights would come up enough to see the art, but in a kind of 
sequence around the room. I would be looking at one spot and it would be 
okay level of brightness, then it would dim considerably—I could still 
kind of see what I was looking at because I was still looking at it, and 
a few seconds later out would get brighter again. My mind could 
integrate over the span. Very clever, the total light exposure was kept 
very low.]


When we decided we were done with the museum and were about to leave 
suddenly a young man in a suit appeared out of nowhere and recited from 
memory, in a thick Chinese accent, one of Obama's famous speeches. (We 
had been Obama donors and volunteers.) We were startled and delighted. 
Turned to each other with big smiles, and when we turned back he had 
vanished.


It took me an embarrassingly long time to realize that this was a well 
prepared contingency, a delaying tactic. I think they wanted time to get 
my computer back into the cloakroom before we got there. (This was a 
kinder, gentler time, when they didn't want to be caught in their snooping.)


I don't know what they did to my computer, nothing obvious. It was a 
cute, tough, little Panasonic "Lets Note" marketed only in the Japanese 
market (complete with my Obama '08 sticker on the lid). I had Red Hat 
(?) Linux on it, which was very unusual behavior, particularly back 
then. Fully encrypted disk, including swap—but not the boot partition. 
My user password was not known to them, not recycled from other 
purposes, not typed out in the open without hunching over the keyboard, 
my encryption passphrase also unknown to them and a lot longer than the 
password. I had left it at the museum in sleep mode, when I woke it up I 
was sensible enough to be observant it seemed to be exactly as I left 
it, same software running, windows in the same position, it had not been 
rebooted. I do know there was later discovered to be a DMA vulnerability 
on the PCMCIA card slot. Or maybe it was the Firewire. Or probably both. 
My guess at the time is they had some exploit ready to install, but were 
pissed to discover I wasn't running MS Windows. Maybe they imaged the 
live RAM. We were in the museum probably for over an hour but I think 
less than two, not sure.

We flew home a couple days later.


They went to a /lot/ of effort, presumably tracking us across the 
country, trying to catch my computer alone in a hotel room and failing, 
they did their research to know were were Obama supporters, someone 
memorized that speech for us. This was not a cheap operation.


I still have the computer, right here (it was a /very/ nice machine), I 
haven't booted it in years, I think I still have record of the 
passphrase and password, I think I even still have the power supply…

Back then I kept my passwords encrypted in a Palm Pilot, but I 
transferred them over to something more modern since. So I have 
passwords records going back a long time. I don't recycle passwords, my 
online accounts have never been compromised via anything other then a 
site itself being incompetent, such leaked passwords from, say, Myspace, 
are worthless elsewhere, I suppose that also makes me suspicious. (The 
Palm Pilot really did stay on me at all times. Or was it alone in the 
dark briefly on Christmas Eve?)


And I'm still just a nobody. But I caught their attention.


-kb, the Kent who probably would not return to China and if he did would 
have to go barefoot, so speak, with only disposable electronics; but the 
Kent who also would love to meet those who were on the other side of the 
operation, they must be getting old, too.


P.S. These days my computer is /fully/, fully encrypted. No unencrypted 
boot partition anymore. No boot partition at all, in fact. I keep that 
in my pocket, on a little UBS device, with my keys.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20260216/d5945fac/attachment.htm>


More information about the cryptography mailing list