Spies Use Tinder

Surveillance and infiltration are not new tactics and collecting data from social media reminds us that the internet is bringing it to whole new levels.

Recently a group of young activists planned to attend a demonstration against Interim President Michel Temer in the city center of São Paulo. They never made it. Their group had been infiltrated by an Army Captain Willian Pina Botelho, via Tinder.

Surveillance and infiltration are not new tactics, but the ACLU revelation last month that Twitter, Instagram, and Facebook had been sharing data with surveillance service Geofeedia reminds us that the internet is bringing it to whole new levels. The story of the “Tinder infiltrator” serves as a reminder for a generation of young activists who are organising online: don't stop organizing, but be vigilant.

In 2013, thousands of Brazilians took their myriad frustrations with the government to the streets. The police and military met these demonstrations with severe violence. Political repression in Brazil has only gotten worse since then.

Botelho was a part of the Brazilian Army's intelligence service during these demonstrations. In December 2014, he created a Facebook profile using the name Baltazar Nunes. He also created Instagram and Tinder profiles, adorned with features such as fake Karl Marx quotes and images of him playing guitar.

“Balta” wasn't just a lurker. He chatted up activists, many of whom were doing a significant portion of their organizing online. On Tinder he told women that he was looking for “leftists” who he could relate to. In fact, it was a woman he had been flirting with who led him to the group of activists arrested on the 4th. The group planned to meet in person before heading to the demonstration together.

That meeting landed 21 young people in jail. They were supposedly arrested because they “looked suspicious,” and later the police claimed they intended to commit vandalism. They didn't have anything truly incriminating with them, although the arrestees allege that the police planted items such as an iron bar on one person. 

As one member told the Brazilian website Ponte.org, the police said “it was one of the members who did not even have backpack. Who would take the subway or bus with a blue iron bar?” Botelho specifically suggested the meeting place, and the arrestees believe that he reported it to the police.

After the arrests, the activists were taken to a special investigations unit, where they were held without attorneys or contact with the outside until a judge ordered them released in a strongly-worded decision that condemned the arrests. Only “Balta” was freed right away. He claimed on social media that he paid a bribe, but just days later he was publicly uncovered as an army officer by Ponte.org.

Despite continuing denials from the government, the Brazilin Army has confirmed that Balta was working with knowledge and cooperation from the São Paulo state government.

This type of infiltration and manipulation is not new. Secret police and social manipulation have been used, as former FBI Director J Edgar Hoover put it, to “expose, disrupt, misdirect, discredit, or otherwise neutralize” political dissent for most of the 20th century, from Syria to South Africa.

Hoover reigned over the FBI's infamous COINTELPRO, short for Counter Intelligence Program. COINTELPRO, started in 1956 and “ended” in 1971, serves as a useful example because it was well documented. Using tactics of infiltration and manipulation of social movements and surveillance of activists, it left no movement untouched. The FBI's main focus was the civil rights movement and the Black Panther Party.

COINTELPRO tactics included infiltration with informants, sending anonymous letters encouraging violence between street gangs and the Panthers and sowing internal dissension in the Party, working with police departments to harass local branches of the Party through raids and vehicle stops, and propaganda. The FBI even created fake Black Panther Party propaganda, a coloring book that emphasized armed resistance:

One particularly well-known COINTELPRO action was the infamous “suicide letter” sent to Martin Luther King The FBI saw Dr. King as threat to national security, and subjected him to comprehensive surveillance and harassment. The anonymous letter encouraged Dr. King to kill himself.

Current Surveillance 

"I didn't believe that they would sink so low, I didn't believe that anything I was doing would be interesting enough, so I think people need to know that this happens to real people.”

These are the words of Kate Wilson, when she came out publicly as a survivor of political infiltration at Chaos Communication Camp in 2015. She spent two years living with a man named Mark Kennedy. In 2010, she learned that he was a cop who had infiltrated and disrupted the UK environmental movement.

Wilson said of Mark, “He was charming and disarming and he shared my interests and he shared my passion for the political things we were doing.” Her story exemplifies how the government uses romantic connections for infiltration. As she has pointed out, it's especially disturbing when one remembers that it is agencies dominated by men who are manipulating women and arranging sex under false pretenses—something that amounts to assault, as the Metropolitan Police admitted when they withdrew their defense in Wilson's legal case against them.

And that's where modern surveillance makes things so much more dangerous, especially when the online and offline meet. As any fan of “social engineering” will tell you, the more background information you have, the easier manipulation is.

Snowden

It's easier for a police officer to both make connections and gather information in the online world, and this is certainly happening. For example, a 2012 slide show from British spy agency GCHQ, leaked by Edward Snowden, describes how a special division of the agency “infiltrated chat rooms known as IRCs and identified individual hackers.” There's also the kind of social media surveillance uncovered by ACLU, which appears to focus on real-time monitoring.

But what's equally concerning is how the government could use surveillance to inform its offline manipulation of social movements. The government can obtain an incredible amount of detail by combing through one person's Facebook posts, which is unsurprising, since movements like the fight against the Dakota Access Pipeline rely on social media to get the word out. But people post about not just their political messages and their plans, but also their hopes, desires, and fears. This is all material that a government informant could use, either to get close to a target or to publicly embarrass or blackmail them.

It's not just oversharing that makes these kinds of tactics more potent, either. Today's version of fake letters could easily be spoofed text messages or emails. Instead of microphones in a hotel room, police today could have access to myriad street-level surveillance technologies. Facial-recognition ready images collected by ubiquitous surveillance cameras, automated license plate readers, and cell phone tracking could easily provide details about an individual's life that could be used to both track and manipulate them.

The worst thing about these tactics is that, regardless of whether infiltration or provocation is actually successful, they have a chilling effect. One of the young people who was arrested in São Paulo wrote that, after his arrest and detention, he had no cell phone. He stayed at the house of a friend, and didn't use the Internet at all. 

And this is perhaps the most important thing to take away from the Tinder infiltrator. As Kate Wilson put it, “this stuff happened to us because we were doing something right. Don't be scared by what we're saying. Be aware.”

Motherboard:             Now Surveillance 'aggressive-invasive': Snowden:  
 

« Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack
Google & Facebook Ban Fake News Sites »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.

Swise

Swise

Swise is a Cyber security and compliance platform for your small business. Simplify and automate your security and compliance with our AI-powered platform.