Hypothetical Scenar...
 
Notifications
Clear all

Hypothetical Scenario for Tracking Device Removal

6 Posts
5 Users
0 Reactions
575 Views
(@saturnalia9)
New Member
Joined: 15 years ago
Posts: 2
Topic starter  

I have been doing Google research and soliciting input from my tech-savvy friends for weeks, but I keep turning up empty, so I'm hoping that maybe somebody here might be able to help me…

So I'm writing a story (I know, I know…*eye roll*) and I need to determine how a character could hypothetically remove either an Electronic Monitoring Device anklet or a Subdermal GPS tracker without alerting authorities that the device has been removed. The answer can be merely plausible rather than practical, so feel free to go as James Bond as you want just so long as the science behind it is somewhat grounded in reality.

The anklet is probably more of a dilemma than the subdermal chip, which I assume can be surgically removed, but I'm not sure how involved that would be (doctor required? equipment? cost?), so maybe in the end, they're equally problematic…

Anyway, if anybody can offer some insight, I will be eternally grateful. Yes, ETERNALLY. Thanks in advance!


   
Quote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

The anklet is probably more of a dilemma than the subdermal chip, which I assume can be surgically removed, but I'm not sure how involved that would be (doctor required? equipment? cost?), so maybe in the end, they're equally problematic…

If it's a science fiction tale, you can well put the suspect inside a non-continuum space hole where either the foot becomes smaller than the anklet or you can turn it's skin inside/out. wink

If it's an actual story, have a talk with a veterinarian they are quite familiar with RFID and similar devices and their implantation or removal (on dogs and cats, but humans are not so different).

About the anklet the essence is to find a way to not loose the continuity of the "ring" around the suspect ankle, you can well (fictitiously) find a way to by-pass the connections/sensors/whatever connecting in two spots an "extension cord" and then cut the anklet between the connections.
More or less what you can see in every other movie when the hero needs to deactivate an intrusion detection system, a few cables with alligator clamps/clips and a pair of pliers/clipper and voila!.
Of course if the device has additional security, like thermal sensors, heart beating sensor, etc, you will need to invent additional workarounds.
(hot water bottle + clock - also veterinarians are familair with this)

In any case all these kind of "radio emitting" devices may "lose" connection for short periods, like when you cross a deep tunnel or enter a banks safe, so one could do quicly the removal (and the placing on other living being with similar temerature and hear rate) inside one of those.

BTW, not really-really Computer Forensics related 😯

jaclaz


   
ReplyQuote
(@piratefrog)
Eminent Member
Joined: 15 years ago
Posts: 20
 

Take a look at embedded systems security and forensics (actually an interesting field of study)

http//www.blackhat.com/presentations/bh-usa-04/bh-us-04-grand/grand_embedded_security_US04.pdf

You're best bet would be a JTAG interface left open on the device (A commonly utilized IO method for embedded systems development), which would allow the firmware of the device to be rewritten with code that does whatever the attacker requires. Relatively plausible (the method is used currently to install custom firmware on network routers for example, or to bypass protections on mobile devices)


   
ReplyQuote
azrael
(@azrael)
Honorable Member
Joined: 19 years ago
Posts: 656
 

An interesting question - I disagree that it's not a forensic problem - it would be if one was hacked ! -)

I had a quick Google, and came across this supplier http//www.adiant-solutions.com/top-uses/law-enforcement.php . If you look at the screenshots, you can see on the left hand side of the device a USB port, so I rather like the scenario of the OS of the device being compromised in some way and then being rewritten/disabled in a way which suits your very resourceful and competent hero/villain ( you didn't say which 😉 )

Or, if you could suitably block the GPS signals and rebroadcast your own signals locally that gave the device a position impression different to where it actually is, there is no need to remove it as it would continue to report that the wearer is at home in bed, when he is really stealing state secrets from the Pentagon … ( there is an issue with this if it is using a cell link to report back the GPS location, as it would triangulate the cell signal to Washington, while the GPS would report London or whatever … [ Where is the Pentagon ? Is it Washington ? ] )

Good luck with the story !


   
ReplyQuote
hcso1510
(@hcso1510)
Reputable Member
Joined: 15 years ago
Posts: 303
 

saturnalia9,
In this "hypothetical scenario" is this person on furlough or work release? It might help if I knew what facility he was planning on fleeing from too. Name, SSN? 8)

Hypothetically I see him loosing his leg in a fight with a light sabre. The monitoring device falls to the ground intact and he is free from his bonds only to be restored later with a bionic leg.


   
ReplyQuote
(@saturnalia9)
New Member
Joined: 15 years ago
Posts: 2
Topic starter  

Thank you so much for the answers, guys! I think an anklet that can be hacked is definitely the way to go, rather than a subdermal chip. Plus, now I get to add a badass hacker character to the mix! What's the going rate for a hacker supervillain these days 😉 ?


   
ReplyQuote
Share: