Technology Threats
Transcription
Technology Threats
4/17/2013 Your Instructor Jim Dill, Deputy Chief, Retired PA Office of Attorney General & President Innovative Technology & Investigative Solutions, LLC Sexting, Stalking, & Social Networking jdill@itis-llc.com 717-884-8167 Goals & Objectives Ultimate Goal Look at the darker side of two common technologies that parents & teens are using. • Cellular & Smartphones • Social Networking Examine how those indispensable technologies can have a negative impact on our lives. Safety Provide methods to prevent or mitigate their harmful consequences. 1 4/17/2013 Negative Impact?? What are some of the undesirable issues facing us with these technologies? • Sexting • Sextortion • Stalking • Identity Theft • Child Predators • On & on & on... Wireless Subscribers Cellular & SmartPhones Cell phones are the #1 form of communication for teens (Pew, 2012). More kids have cell phones than ever before, including 83% of middle school students (Massachusetts Aggression Reduction Center, 2012). Teens text more than they talk — averaging 3,146 text messages a month, compared with 203 calls (Pew, 2012). 58% of teens have Smartphones (Neilson, 2012). 18% share their location (Pew 2012) 2 4/17/2013 Cell Phones & Convergence What capabilities does your cell phone or PDA possess? 1. Make & receive calls 2. 3. 4. 5. Send & receive text messages Send & receive e-mail Surf the web Play music 6. 7. Take & store photos Take & store videos 8. 9. Record & store audio notes Contact Manager/Calendar 10. 11. GPS Device Calculator 12. Video game player 13. Download & play TV & Movie 14. A cellular modem for your laptop 15. Wireless LAN allowing up to 5 devices to use the phone’s modem for Internet access 16. 17. 18. E-Book reader Alarm monitor & DVR Credit card replacement??? Plus thousands of iPhone & other phone applications Cell Phone Vulnerabilities You are carrying a portable computer with all those capabilities! What personal information is on your phone today? • • • • Private contact info (family & friends addresses & phone numbers) PINs, passwords, account numbers Photographs & Videos E-mail & Text Messages • Calendars & Events • GPS (Location) Information. • Recent Call History But How Safe is that Information?!? Is Your Mobile Phone Protected? If you lost or someone got a hold of your cell phone today what information would you be you be providing a Stalker! • Is your phone locked??? If not DO IT! How? http://blog.ctia.org/2012/03/22/passwords-mobile-device/ • What steps should you take if you lose your cell phone? • Contact provider & suspend service. • Call it or use a utility to locate by sound or GPS. • Use a utility to remotely wipe your phone. http://www.ctia.org/consumer_info/safety/index.cfm/AID/12087 Implications for Child, Family & Police 3 4/17/2013 Sexting Statistics* Definition The term was defined in 2010 by the court in United States v. Broxmeyer, as the exchange of sexually explicit text messages, including photographs, via cell phone. The word is derived from the combination of two terms sex and texting. However it isn’t just words! Many teens “flash” and send sexual or partially nude photos of themselves The percent of teenagers who have sent or posted nude or semi-nude pictures or video of themselves: • 20% of teenagers overall • 22% of teen girls • 18% of teen boys • 11% of teen girls ages 13-16 The percent of teenagers sending or posting sexually suggestive messages: • 39% of all teenagers • 37% of teen girls • 40% of teen boys *Published in July 2010 FBI Bulletin Sexting Many teens don’t look at long term consequences when sexting. Many times it is a result of peer pressure or bullying It can and does lead to stalking, harassment, sextortion & suicide. Plain & simple – Sexting can dramatically damage one’s life and self esteem. Increase in Crime-Sextortion •Sextortion • Extortion using digital sexual photos/videos as blackmail • A Case of ‘Sextortion’ Cons Like ‘Bieber Ruse’ Targeted Minor Girls – FBI Website February 2013 • Hacker blackmailed over 350 women into stripping on their webcams, FBI says • January 2013 • Webcam cyber-sextortionist preyed on over 200 women • November 2010 Jessica Logan Story • 15 year old Amanda Todd’s suicide 4 4/17/2013 Amanda Todd’s Story Amanda was bullied viciously on Facebook where her schoolmates were invited to join a page which included her breasts as the Avatar, causing Amanda to suffer from anxiety and depression. It started after an unknown man convinced her to expose herself online in front of a webcam. He told her she was beautiful and just wanted her to flash him. He blackmailed her (sextortion) and spread the photos around, destroying her reputation. The bulling was incessant and although she changed schools 3 times it followed her via Social Networks. On 10 October 2012, Amanda Todd committed suicide. It was just one week before her 16th birthday. 9 teens arrested after she hung herself. View Amanda’s Story Self Destructing Messaging Apps Parents know what to look for! Potential Sexting Apps • There are dozens of texting apps on the market. Many provide secret ways to hide the messages on the phone. Even the App may be deceiving one actually disguised as flash light app. • Self Destructing text messages have given kids the false impression that they can sext safely. They include: • Snapchat, Facebook Poke, Tiger Text, Burn Note, Wickr, and others allow you to set a timer which will cause the message to be deleted at a predetermined interval Easy Ways to Defeat • Take a screenshot (although some apps will notify the Sender). • Take a picture before the message expires. Facebook Poke Snapchat • After receiving a message but before opening copy a file to computer. Tigertext Burn Note Wickr 5 4/17/2013 The Law in PA Currently, in Pennsylvania, sending explicit photographs by minors, ages 12 to 17, a misdemeanor or summary offense, rather than a felony. Only for first-time juvenile offenders After the first offense it falls under the child pornography laws Juvenile gets labeled as a sexual predator Sexting-What Can Be Done Technically – parental controls & spy apps - good idea??? Parental involvement is key • Educate your teen respectfully. • Explain the long term consequences and that it is a crime. • Keep the device age appropriate • If your child receives an inappropriate message – DON’T DELETE, call the authorities • Trust but verify! – Speak with your child… • Take inventory- look at all the gadgets that can take or store photos or videos, these can include: cell phones, social networking sites, video game consoles (X-Box, WII), IPods, mp3 players etc. • Look for Apps that can conceal or password protect messages What to Say to Your Child? Text Messaging & Instant Messaging Lingo A good source to help decode Text Messaging acronyms and emoticons: www.netlingo.com/acronyms.php http://www.teenchatdecoder.com http://www.netlingo.com/smileys.php 6 4/17/2013 EXIF - Exchangeable Image File Format Camera settings and scene information are recorded by the camera into the image file. Often called Metadata. Most photo viewers can read EXIF data EXIF Data EXIF Data from a Digital Camera Most cell phone cameras and many newer digital cameras insert geo-location information EXIF Data 7 4/17/2013 EXIF Data from a Cell Phone EXIF Location Data Demo Let’s look at what happens when we post these pictures at some photo sharing sites. EXIF News Report http://www.flickr.com/explore/ DEMO Solutions Turn off GPS on phone/camera for photos. • Go into your phone’s camera, location, or security settings Solutions • • Set security on photo sharing site. Remove EXIF information • With Window’s Vista or 7: • Right click photo • Select: Properties • Select: Details • Select: Remove Properties & Personal Detail • Choose to remove all or just GPS data • Or use an EXIF Remover App such as “EXIF Cleaner” DEMO 8 4/17/2013 Definition Cyberstalking or Digital Stalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of digital and computer communications. It is a crime in ALL 50 States! Another Cell Phone Vulnerability • In PA Title 18 § 2709.1. Stalking. Digital Stalking There are dozens of applications that can be loaded onto a cell phone that permit you to monitor all activity on that phone! Many are sold under the guise that parent can monitor their child’s activities. These applications run hidden in the background and are very difficult to detect. They are often used for Stalking & Harassment 9 4/17/2013 Smart Phone Apps Cell Phone Spy Programs Stalking Made Easy • There are hundreds of thousands applications now written for Smartphones. • • • • Mobile Apps Secret listening device ("bug") for a phone. Option to schedule for later (don't get busted "playing with your phone") Record with no visible indication Google has surpassed Apple with over 800,000 apps Apple has approximately 750,000 apps The Android is an Open Source architecture Many apps for Google can be purchased on sites other than the Google Play Store Mobile Apps Turns your phone camera or webcam into a visual motion triggered SpyCam. Your phone or webcam will auto-capture (still photo or video) any motion within it's field of vision, and then save to MicroSD or email the image. Can also text it to take photo or video. 10 4/17/2013 Mobile Apps Mobile Apps Install this APP to receive a copy of any text received on the targeted phone to your email. It looks like a calculator is activated by typing “111444777 Clear” into the calculator MobileGPSpy runs on android phone hidden in the background Turns your phone into a covert GPS Tracking Device Runs discreetly in the background Child Safety Apps Cell Phone Security Tips Turn off GPS settings or change to 911 only. Know the Apps that are on your Child’s phone! Consider Lost/Anti-Theft applications for tracking phone or erasing the device. FBI Child ID Emergency Family Pro Find My Kids-Footprints Sex Offender Search Baby Monitor HD Family Tracker http://www.ctia.org/consumer_info/safety/index.cfm/AID/12087 11 4/17/2013 Definition Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices, including cell phones. Not just a Cell Phone Issue Statistics A 2010 survey of children and teenagers between the ages of 10 and 18 by the Cyberbullying Research Center shows: • 20.8% of the kids have been cyberbullied in their lifetime • 17% have been cyberbullied at least once in the previous 30 days • 13.3% have been cyberbullied by rumors online • 14.3% have been cyberbullied by mean or hurtful comments online • 7.2% have been threatened online The American Academy of Child and Adolescent Psychiatry finds children who are bullied experience suffering that can interfere with their social and emotional development, and harm school performance. Case Study Cyberbullying An Actual Case Study 12 4/17/2013 Cyberbullying What Can Be Done? Never post or forward inappropriate pictures or images of others – Don’t Participate! Don’t reply! It usually just encourages the sender. Stalker’s Communicate with a trusted adult. If it isn’t harmful label it as junk. If it is serious or threatening DO NOT DELETE. Contact the authorities. They will need the original for evidence and to trace it to the sender. If you notify the Social Network they are obligated to remove the post making it difficult to prosecute. Definition Social Networking Timeline What is a Social Network? • Any group that gets together with a common interest What is online Social Networking? • Socializing from behind a keyboard • Keyboard Courage Danah. M Boyd - UC Berkeley 13 4/17/2013 Is Social Media a Fad? Is Social Media a Fad? The Social Networking Revolution NO, Social Media isn’t a fad, it’s a fundamental shift in the way we communicate So How Big is it? How big is it? Facebook alone has over 1 BILLION users!! • Population of the US is around 330 million! • That is 11% of the world’s population. Google+ had reached 10 million users just two weeks after it was launched. After 4 weeks in operation, it had reached 25 million users. That took Facebook 3 years! As of the end of Dec. 2012 it had 343 million users*. Twitter has 340 million tweets written each day • Social Networking is a business!!! *stats by UK market research firm Trendstream 14 4/17/2013 Number of Social Network Users There are now more social-networking accounts than there are people in the world, according to figures from In-Stat dated April 2011. Social networking site usage grew 88 percent among Internet users aged 55-64 between April 2009 and May 2010 (Pew Research) Attributes of Social Networking Social Networks Directory Good Resource! Listing of Social Networking Sites http://traffikd.com/social-mediawebsites/ Top 10 Based on Followers January 2013 – www.Twitaholic.com Instantaneous Communications • Chats, Posts, IM, Photo & Video uploads • You can be “notified” upon receiving any communication. Mobility of Communications • Smartphone provide mobile access Reach of that Communication • Millions can be reached within seconds (yes, millions) 15 4/17/2013 Social Networking Terms Avatar - A small image found at the top of your page and is considered a visual representation of yourself. Most often it is a photo of yourself. Buddy/Friend List - A collection of friends and contacts names stored in a central that you share with. Tagging - The process of adding information (usually a name) that identifies a Web photo Social Networking Terms Messaging - instantaneous person-to-person keyboard communication. Privacy Settings – The optional settings on most social networks that determine your privacy and what information you share. Many social networks require you to “opt in” to privacy features Geo-Tagging – Adding location information usually in the form of GPS coordinates to your communication. Facebook 16 4/17/2013 MySpace Twitter •The first big microblogging site • You have 140 characters of text to comment, and as soon as you hit update, the site's millions of users can see what you're up to. • Can transmit via Text message right to cell phone • You can make Tweets public or private and visible only to people you approve • Can provide Geo-Tagging with every Tweet LinkedIn Foursquare 17 4/17/2013 YouTube Other Social Networks! YouTube is only 6 years old 1 trillion – The number of video playbacks on YouTube in 2011. 140 – The number of YouTube video playbacks per person on Earth. 48 hours – The amount of video uploaded to YouTube every minute. It Exceeds 2 billion (yes billion) views/day. •Other different social networks… •Vampirefreaks.com (for those into the Twilight scene). •Gothpassions.com (dating social network for those into Goth lifestyles) •MatchADream.com (match your dreams with others) •Caringbridge.org (a site for family members of sick of terminally ill patients) (Stats according to Pingdom.com) Elements of a Social Network A profile or bio about yourself (personal info) usually includes Avatar (photo). 18 4/17/2013 Profile Info-what are they asking for? Picture Gender DOB/POB Email address Physical Address Cell Phone # Other #’s Education Years Graduated Work History Family Relationship Status Religion Political View Hobbies & Interests Languages • No verification Elements of a Social Network Search for & create “friend” lists Status updates/news feeds Photo & video sharing – EXIF Information Photo Tagging & Facial Recognition Send & receive messages (open or private) Elements of a Social Network Applications (games, utilities, etc) Terms of Service – sample Privacy Controls Mobile vs Desktop Geo-Tagging/Geo-Location Be Cautious About What You May Be Giving Up! Let’s take a deeper look at a couple of these elements 19 4/17/2013 Applications Applications • You should always be careful about which Facebook apps you allow to connect with your account, as they can collect varying levels of information about you. If you aren't comfortable with that, don't install the app. • Furthermore, even if you are careful about what Facebook apps you install - are your friends being just as cautious? • It may surprise you to hear that when other Facebook users choose to install apps they can then share the information they can see about you with those apps. Friends/Buddy List One you accept someone as a “Friend” they normally have unfettered access to your postings, pictures friend listing. Social Networking sites suggest friends you may know based on your profile or contact list Review Periodically! Many accept “Friends” that they don’t even know. 20 4/17/2013 A Very Important Link on Facebook Even Cops are Fooled UNFRIENDING A fictitious profile meant to fool cops into friending. This gives them full access to the officers profile & personal information. The photo of the officer was taken from an Officer Down Memorial Page. Photo & Video Sharing Tagging & Facial Recognition According to 2011 statistics gathered by Pixable and posted on www.Photoweekly.com • Photobucket has 8 billion photos posted on line • Picasa has 8 billion photos posted on line • Flickr has 7 billion photos posted on line • Instagram over 1 Billion 21 4/17/2013 Photo & Video Sharing Photo & Video Sharing The number of photos on Facebook is exploding!! With the purchase of Instagram for $1 BILLION dollars Facebook now houses over 219 Billion photos on their servers! Facebook is the largest repository of pictures anywhere and at any time in history per the NY Times! 220,000,000,000 As of June 2012, its users upload 300 million pictures a day! Photo Searching Photo Tagging There are numerous search engines that search the unprotected photos on Facebook as well as other Social Networks e.g. http://www.labnol.org/image-search/ Every day, people add more than 100 million tags to photos on Facebook. Tagging is adding the name of an individual pictured in the photograph. This image search engine lets you find photos that are on Facebook, Flickr, Zooomr, MySpace, US Government sites, Photobucket, Corbis, deviantart, Webshots, Blogger, Typepad and WordPress. 22 4/17/2013 Photo Tagging Removing a Photo Tag Who Can See Tags? You may remove a tag from a photo you're tagged in, so it doesn't appear on your profile (timeline). Removing a tag unlinks your name from the photo and ONLY takes the photo off your profile (timeline). The photo will still be visible in other places unless the person who posted it takes it down. What if you don’t use Facebook? ?????? If you don’t like a photo you’re tagged in, you can ask the person to take it down or escalate the issue: When someone is tagged, it may be visible to: • The audience selected for the post • The person tagged • Friends of the person tagged If the audience of the post... To learn more about Tags look in “Privacy Settings”. Facebook can’t make people remove photos that don’t violate their Statement of Rights and Responsibilities. Removing a Photo Tag AKA: Tag Suggest 23 4/17/2013 Facial Recognition • April 2011 Facebook starts using its own facial recognition technology to identify your friends in photos called “Tag Suggest” • Facebook Changes Privacy Settings to Enable Facial Recognition – June 7, 2012 NY Times Opting Out of Facial Recognition In the Privacy Settings Find the Profile (Timeline) and Tagging section and choose Edit Settings. Click Who sees tag suggestions when photos that look like you are uploaded? Click on dropdown in the lower-right corner of the pop-up and choose “No One”. • Facebook Acquires Israeli Facial Recognition Company Face.com – June 18, 2012 Times • Unlike other Photo recognition applications (Picasa) with Facebook the “Facial Recognition” data remains on “their” servers! Remove Your Facial Data From Facebook When you turn off tag suggestions, Facebook won’t suggest that friends tag you when photos look like you. The template that we created to enable the tag suggestions feature will also be deleted. Note that friends will still be able to tag photos Location Based Services of you manually! 24 4/17/2013 Geo-Location Geo-location apps do two things: • They report your location to other users. • They associate real-world locations (such as restaurants and events) to your location. Geo-Location That location info can be GPS, WPS (Wi-Fi Positioning System), Cellular Triangulation, or XPS (a combination of all 3). Most new cameras and cell phones default to adding geotagging to your photos in the Many smartphone applications incorporate geo-tagging. Social Networking Apps Ban.jo • Combines feeds of Twitter, Facebook, & Foursquare • Shares communications & location info across platforms Geo-Location Social Networks go mobile • Using smartphone applications • Facebook Places, Foursquare, • Loopt, Google Latitude • Many others including Twitter www.robmenow.com 25 4/17/2013 Geo-Location Social Networking Privacy Controls Facebook Privacy Controls Each social network has its own: • Privacy Policy • Terms of Service • Privacy Controls • Controls are complex and numerous Applications request access to most of you bio and personal information http://www.takethislollipop.com/ http://www.cio.com/article/508121/The_How_To_Guide_for_Facebook 26 4/17/2013 Implications for Families •Identity Theft •Child Porn/Child Predators Feds bust child porn 'social networking site' Largest crimes against children case brought anywhere by anyone’ By CHARLES WILSON Associated Press Writer updated 4:11 p.m. ET, Thurs., May 27, 2010 INDIANAPOLIS - Federal prosecutors announced Wednesday that they had broken up a major online international child pornography ring that at its peak had more than 1,000 members trading millions of sexually explicit images. More than 50 people have been arrested in several states… Potential Dangers! Implications for Families 29,000 Sex Offenders Found on MySpace by Gary D. Robertson, Associated Press July 24, 2007 MySpace has located and deleted a stunning 29,000 registered sex offenders from its site — more than four times the number it initially reported… Increase in Crimes •Fraud •Prostitution •Gangs • Recruiting • Bragging • Police can search for Users displaying Gang Insignia •Drugs •Sextortion Chat Roulette 27 4/17/2013 Staying Safe on Social Networks Set your security settings!!! Limit info on your profile/bio. Use an Avatar that is not your picture. Utilize Facebook’s new Smart List feature. Review your friend list & accept only new friends that you trust. Staying Safe on Social Networks Do Not provide your location or itinerary as part of a wall post or status update! Avoid Geo-location apps. Staying Safe on Social Networks Use Parental Control Apps such as the iPhone/iPad “Safe Eyes” or Norton On-line Family to protect your child from visiting dangerous or pornographic sites. Remove Geo-tags from photos. Learn how to block individuals. Report serious cases of abuse to the police first then to the Social Networking site! Know the difference between suspending & deleting an account. 28 4/17/2013 Software to Protect Yourself & Your Family Resources Microsoft Safety & Security Center http://www.microsoft.com/security/default.aspx National Center for Missing & Exploited Children http://www.missingkids.com McAfee Internet Safety http://www.internetsafety.com/ PA Office of Attorney General http://attorneygeneral.gov/kidsparents.aspx Your Safe Haven http://www.yoursafehaven.org/index.php Questions? 29