<<

10/9/2019

Teens & Technology Unintended Consequences

1

Your Instructor

Jim Dill, Deputy Chief, Retired PA Office of Attorney General & President Innovative Technology & Investigative Solutions, LLC

[email protected] 717-884-8167

3

1 10/9/2019

PDF Copy of Presentation

https://bit.ly/TeensandTech

4

Goals & Objectives

Look at the darker side of common technology issues as they relate to the juveniles, advocates, courts, police & parents. • Sexting & Sextortion • Cyber Bullying & Viral Shaming Look at some of the everyday technologies that lends itself to these issues. Goal - Raise your awareness!! Goal - Demonstrate methods to prevent or mitigate their harmful consequences.

5

2 10/9/2019

Ultimate Goal Safety

6

I Need Your Participation!

In the form of: Questions???? Experiences Ideas

ITIS, LLC All Rights Reserved

7

3 10/9/2019

Survey

On a Scale from 1 to 5 rate your understanding of ? How many are NOT on ? How many participate on Social Networks? •Your Family Members?

ITIS, LLC All Rights Reserved

8

Let’s begin by looking at the technologies that create some of the problems

9

4 10/9/2019

Wireless Subscribers

2017 CTIA Wireless Snapshop

10

Cell Phones Capabilities & Convergence of Technologies

Make & receive calls Download & play TV & Movie Send & receive text messages A cellular modem for your laptop Send & receive e-mail Wireless LAN allowing up to 5 devices to Surf the web use the phone’s modem for Internet access Take & store photos E-Book reader Take & store videos Alarm monitor & DVR Record & store audio notes Credit card replacement Contact Manager Bluetooth Device GPS Device Calendar Store Documents • Plus hundreds of thousands of iPhone & other phone apps! Play music Video game player

11

5 10/9/2019

Keep Your Data Safe

Password Protect Your Phones!

12

Cell Phone Security

13

6 10/9/2019

Cell Phone Hijacking!

Actual Phone Hijacking

Internet resource on cell phone spy : http://acisni.com/

14

Negative Impact

 These simple indispensable devices have become part of our everyday life but can easily create an atmosphere of:  Threatening behavior  Unwanted advances  Harassment  Sexting  Sextortion  Cyber Bullying

 All directed at another using cellular and computer communications.

15

7 10/9/2019

EXIF Data

17

EXIF - Exchangeable Image File Format

Camera settings and scene information are recorded by the camera into the image file. Often called Metadata. Most photo viewers can read EXIF data Most cell phone cameras and many newer digital cameras insert geo-location information

18

8 10/9/2019

EXIF Data

20

EXIF Data with GPS

DEMO DEMO2

21

9 10/9/2019

EXIF Location Data Demo Let’s look at what happens when we post these pictures at some photo sharing sites.

EXIF Newsflash Report

http://www.flickr.com/map

22

Solutions Turn off Location Services on phone’s camera.

iPhone Android

23

10 10/9/2019

Solutions

• Set security on photo sharing site. • Remove EXIF information • With Window’s Vista or 7: • Right click photo • Select: Properties • Select: Details • Select: Remove Properties & Personal Detail • Choose to remove all or just GPS data • Or use an EXIF Remover App such as “EXIF Cleaner” DEMO

24

Location Based Services

25

11 10/9/2019

Geo-Location Geo-Tagging involves adding location data to an image, text message, video or app.

That location info can be GPS, WPS (Wi-Fi Positioning System), Cellular Triangulation, or XPS (a combination of all 3).

Most new cameras and cell phones default to adding geo- tagging to your photos.

Many smartphone applications incorporate geo-tagging.

27

Wi-fi Positioning System

28

12 10/9/2019

WI-Fi Positioning System (WPS)

Developed by Skyhook Wireless Gathered location Wireless Local Area Networks (WLAN) through wardriving Includes >100 million Wi-Fi access points & is constantly updated With WPS no GPS hardware required Was primary location engine for Google Maps on the iPhone Tracking built into most Internet Browsers

29

iPhone

The iPhone now remembers everywhere the user goes by default.

Apple has buried this function very deep. Settings > Privacy > Location Services > System Services > Frequent Locations (Significant Locations iOS 11).

30

13 10/9/2019

Wi-Fi Positioning System (WPS)

This car is equipped with Wi-Fi–sniffing hardware to record the names and MAC addresses of routers to improve Google location-specific services.

31

Android Phone – Location History

If Location History is on your Android phone keeps a history of locations you have been.

https://www.google.com/maps/timeline?pb

ITIS, LLC All Rights Reserved 32

14 10/9/2019

Location History - Android

To turn off Location History go to: Settings, Location, Google Location Reporting, Location History and slide switch to off.

33

Geo-Location

Social Networks go mobile • Using smartphone applications • Facebook Places, Foursquare, • Swarm, and many others including • Facebook Location History

34

15 10/9/2019

Gaming MMORPG - A Massively Multiplayer Online Role- Playing Game such as World of Warcraft. •Virtual Worlds – REAL Crimes! •Drug and drug deals (Kids using Adderall) •Child pornography •Child predators •Terrorism… •Paris ISIS terrorists employed Sony PS4 to communicate, and used encrypted messaging apps Telegram and WhatsApp.

35

SMS & MMS Through the Cellular Provider Or Using a

36

16 10/9/2019

Text Messaging – Science Through the Cellular Provider

The exchange of brief written messages between mobile phones over cellular networks - AKA: Short Message Service (SMS). It is limited to 160 characters/message. Use Cellular Control Channel MMS - Multimedia Messaging Service includes messages containing image, video, and sound content. This is the common platform many use to text and comes with all cell phones.

37

Text Messaging How It Works

• SMS is a store-and-forward service, meaning that when you send a text message to a friend, the message does not go directly to your friend's cell phone. • Messages are stored in phone either in memory, on the SIM card or on a micro SD card until deleted (and beyond)! Even deleted messages are recoverable. • If you use the carrier’s text message service call details show up on your Online Billing

38

17 10/9/2019

Proprietary Messaging Apps

• Both the Sender & Receiver must have the app. • These are texting apps outside of the Carriers control and broadcast over the Internet using Wi-Fi or the devices data plan. • Many provide secret ways to hide the messages on the phone. Even the App may be deceiving one actually disguised as flash light app. • Don’t need a phone to send a text. • Some even “claim” to be self destructing!

ITIS, LLC All Rights Reserved 39

Proprietary Messaging Services WhatsApp Jaxtr Telegram Viber Text Plus Shady SMS – a hidden sexting app that only you TxtDrop can see or open. To open Hide My Text you need to dial a code. iMessenger Shady SMS SMS Calculator Many Others

Apps use a smartphone's data plan or Wi-Fi to transmit and receive messages, a feature that appeals to individuals looking to avoid text messaging by phone service providers.

40

18 10/9/2019

Chat Feature on Kids Apps

Many Apps like Musical.ly have a chat feature turned on by default. Any user can comment on another user’s posting Predators have taken advantage of the chat feature to contact and prey on teens and preteens.

GMA Report

41

Musical.ly is now TikTok

TikTok, also known as Douyin in China, is a Chinese music video platform and that was launched in September 2016 by Zhang Yiming, founder of Toutiao. Wikipedia

ITIS, LLC All Rights Reserved 42

19 10/9/2019

43

Self Destructing Text Messaging Apps

• Self Destructing text messages have given kids the false impression that they can sext safely. They include:

, Wickr, Tiger Text, Facebook Messenger, Dust, and others allow you to set a timer which will cause the message to be deleted at a predetermined interval

44

20 10/9/2019

Self Destructing Messaging Apps

Snapchat Easy to Defeat

45

Easy Ways to Defeat Some Self Destructing Messaging Apps

• Take a screenshot (although some apps will notify the Sender). • Get a friend to take a picture before the message expires. • After receiving a message, but before opening, copy file to computer. • Via forensic software. Photos don’t really disappear they are just marked as not to be viewed.

ITIS, LLC All Rights Reserved

46

21 10/9/2019

How to defeat screenshot detection Once you received the Snapchat put phone in airplane mode. Open Snapchat & take screenshot. Log off & close app. Go to Application Manager & clear data. Take phone out of airplane mode Log back into Snapchat – photo won’t even be opened.

ITIS, LLC All Rights Reserved 47

SnapHack App

48

22 10/9/2019

Snapchat More than photos & videos SnapCash • Snapcash is an online money transfer service offered by Snapchat. • The actual business platform is run by Square Up. • Snapcash can be used to transfer money between Snapchat users using a linked, U.S. issued Visa or MasterCard debit card only. Yolo • On Yolo is an app that allow you to anonymously ask questions to any other user. You can also share your reply on Snapchat.

ITIS, LLC ALL RIGHTS RESERVED

49

Snap Map

In June of 2017 Snapchat introduced a new feature called Snap Map that connects to your phone’s GPS. Feature automatically (unless you’ve activated ghost mode) shows where you are on a map to anyone who is on your friends list and posts can possibly seen publicly depending on your settings!!

50

23 10/9/2019

Dust

ITIS, LLC ALL RIGHTS RESERVED

51

Confide

The service enables users to send out fleeting messages that appear one line at a time to safeguard the application against screenshot saving.

ITIS, LLC ALL RIGHTS RESERVED

52

24 10/9/2019

Facebook Messenger Secret Conversation

• Available for iOS or Android • Encryption IS NOT the default mode it must be activated. • Doesn’t encrypt previous messages. • Does not work with Group Messages. • Has a self-destruct feature that can be set from 5 seconds to 1 day

• DemoITIS, LLC ALL RIGHTS RESERVED

53

Where Texting Goes Wrong Implications for Child, Family, Police & Judiciary

54

25 10/9/2019

Sexting Statistics Content Author: Statistic Brain Date research was conducted: April 26, 2016

http://www.statisticbrain.com/sexting-statistics/

56

Superintendent: Nude photos scandal involves several hundred students

Author: Dana Clemens, Weekend anchor/Multimedia Journalist , [email protected] This wasn’t just a massive sexting scandal involving high school kids: this was a veritable collectibles franchise. With 351 sexually explicit images getting passed around Canon City High School in southern Colorado, US, the kids were trading them like baseball cards, Fremont County District Attorney Thom LeDoux said last week. The sexting apocalypse exploded, when Superintendent George Welsh initially estimated that half the school was involved – that’s about 500 students, including some eighth graders. Police said students used a mobile phone app that hid the photos.

57

26 10/9/2019

Where Do Predator’s Get Their Photos? • Teens are supplying them! • According to the National Center for Missing and Exploited Children (NCMEC) of the more than 130 million images containing child pornography examined since 2002 by NCMEC, one in four were initially posted by minors themselves, said John Sheehan, executive director of the organization. • In a search lasting just 40 hours, the Internet Watch Foundation found 12,224 self-generated images of teenagers on 70 pedophilic websites.

58

Sexting Many teens don’t look at long term consequences when sexting. Many times it is a result of peer pressure or bullying It can and does lead to stalking, viral shaming, cyber- bullying, sextortion & suicide. Plain & simple – Sexting can dramatically damage one’s life and self esteem.

Jessica Logan Story

59

27 10/9/2019

60

Other Sexting Issues SMS Abbreviations Deciphering Text Messages • Abbreviations and acronyms are extensively used in Text & Instant Messaging. • Emoticons – symbols used to display feelings

GNOC • Get Naked On Camera KPC • Keep Parents Clueless PIR • Parents In the Room

61

28 10/9/2019

Drug Emoji Examples

ITIS, LLC ALL RIGHTS RESERVED

62

X-Rated Emoji

ITIS, LLC All Rights Reserved 63

29 10/9/2019

Text Messaging & Instant Messaging Lingo

Good sources to help decode Text Messaging acronyms and emoticons:

www.netlingo.com/acronyms.php https://www.urbandictionary.com/

64

Other Ways Kids Fool Parents*

o Clearing the browser history. o Close/minimize browser when parent walked in. o Hide or delete IMs or videos. o Lie or omit details about online activities. o Use a computer your parents don’t check. o Use phone apps made to hide things from parent’s view. o Use private browsing modes. o Create a private email address unknown to parents. o Create duplicate/fake social network profiles. Many Parents are just intimated by the technology!

*McAfee – The Digital Divide June 2013

65

30 10/9/2019

Title 18 § 6321

66

The Law in PA Title 18 § 6321. Transmission of sexually explicit images by minor (Amended 12/2012). (Act 198)

• Currently, in Pennsylvania, sending explicit photographs by minors, ages 12 to 17, a misdemeanor or summary offense, rather than a felony. • Only for first-time juvenile offenders • After the first offense it falls under the child pornography laws • Juvenile gets labeled as a sexual predator

ITIS, LLC All Rights Reserved 67

31 10/9/2019

Sexting-What Can Be Done

Technically – parental controls & spy apps - good idea??? Parental involvement is key • Educate your teen respectfully. • Explain the long term consequences and that it is a crime. • Keep the device age appropriate • If your child receives an inappropriate message – DON’T DELETE, call the authorities • Trust but verify! – Speak with your child… • Take inventory- look at all the gadgets that can take or store photos or videos, these can include: cell phones, social networking sites, video game consoles (X-Box, WII), IPods, mp3 players etc. • Look for Apps that can conceal or password protect messages

68

Not just a cell phone issue

69

32 10/9/2019

Definition & Case Studies •Sextortion - Extortion using digital sexual photos/videos as blackmail

• Children across the world, some as young as 8 years old and many in the U.S., were blackmailed into performing sexual acts online and even forced into self-harming, according to Scotland Yard.

• Over the past two years, at least 424 children have become victims of the blackmail, leading to seven people taking their own lives, according to new research published today by the Child Exploitation and Online Protection Centre (CEOP), a police agency in the United Kingdom.

70

Sextortion – Case Studies

• A Case of ‘Sextortion’ Cons Like ‘Bieber Ruse’ Targeted Minor Girls – FBI Website February 2013 - Christopher Patrick Gunn, 31, of Montgomery, Alabama, was sentenced to 35 years in prison for producing child pornography through a massive online sextortion scheme. Gunn pretended to be the teen pop star on several interactive video chat services. When Gunn convinced girls he was the singer, he offered them free concert tickets or backstage passes in exchange for topless photos or webcam videos. Gunn employed these tactics for more than two years! • Hacker blackmailed over 350 women into stripping on their webcams, FBI Website January 2013 • Brokerage fires assistant accused in ‘sextortion’ of client-Sep 13, 2013 • 15 year old Amanda Todd’s suicide

71

33 10/9/2019

Sextortion – Other Case Studies

Miss Teen USA Sextortion Case: 19-Year-old Arrested for Allegedly Hacking Cassidy Wolf

by NATALIE FINN Thu., Sep. 26, 2013– E Online

Jared James Abrahams of Temecula, Calif., has been arrested and charged with extortion and cybercrimes for allegedly hacking into Wolf's computer and threatening to go public with nude photos purportedly taken on her compromised webcam if she didn't comply with his demands.

In March 2013, the 19-year-old beauty queen claimed that she being targeted by a hacker who claimed to have stolen nude photos of her from her web cam and computer.

72

Sextortion What Can You Do?

• Don’t share intimate images! • But if you already did - get them deleted! • Don’t take for granted that your computer’s anti-virus software is a guarantee against intrusions. • Cover your webcam when not in use. • Don’t open attachments without independently verifying that they were sent from someone you know. • If your computer has been compromised and you are receiving sextortion threats, don’t be afraid to talk to your parents or to call law enforcement.

75

34 10/9/2019

76

Cyber Bullying/Viral Shaming Definition Cyber bullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices, including cell phones.

The American Academy of Child and Adolescent Psychiatry finds children who are bullied experience suffering that can interfere with their social and emotional development, and harm school performance.

77

35 10/9/2019

Bullies use to torment their victims

Anonymous communication platforms and the pre-teen-to- teenage brain are two things that don’t mix all that well. Just look at Ask.fm, for example, the social Q&A platform whose shield of anonymity led to cyberbullying that was later cited as a contributing factor in well over half a dozen suicides.

78

Anonymous Networks & Apps

• National School Safety and Security Services reviewed more than 800 threats reported in the media during the first half of the 2014-2015 school year and found that about one-third were sent electronically using text message, social media, email or other online means. Threats included bomb scares, shootings, even terrorism. • Cyber Bullying has skyrocketed! • Use of anonymous social networks and apps has been a leading contributor. • Applications such as Burnbook, Afterschool, YikYak, and Kik are examples of what students are using.

79

36 10/9/2019

Ask.FmVictims

• 14-year old Hannah Smith took her own life after receiving abusive messages from other users on the site: “drink bleach”; “go get cancer”; and “go die”. • 16-year old Floridian Jessica Laney was found dead in her home after bullying on Ask.fm — one commenter had even asked “can you kill yourself already?” Others had called her “fat” and “a loser.” • 15-year-old Ciara Pugsley committed suicide after being taunted by anonymous posters on the site who called her “slut” and “ugly.” • 13-year old Erin Gallagher, who faced vicious bullying about her weight and looks, committed suicide.

80

Anonymous Messaging Apps

After School

Other Anonymous Chat Apps

ITIS, LLC All Rights Reserved

81

37 10/9/2019

YikYak Anonymous Social Chat Site

YikYak banned as schools grapple with toxic anonymous social chat. Some Chicago schools have banned the location-based mobile app, causing the developers to turn it off throughout the city as they seek a way to keep it off of school grounds. YikYak has lead to multiple school lockdowns in the wake of bomb threats, as well as a new way to perpetrate cyberbullying.

82

YikYak in the News

83

38 10/9/2019

ITIS, LLC All Rights Reserved Secret 2.0

When Secret launched, it quickly became the most talked-about new social network in Silicon Valley. Like other ‘"anonymish" social networks, it offers a compelling mix of sex, drugs, and intrigue.

84

Anonymous Social Networking App Whisper

Whisper is a social networking service that relies on images and anonymity to create connections and conversations. Users are asked to set a username and PIN. You can respond to a message publicly or privately, choosing a public anonymous post or a private pseudonymous chat. Users don't have a public identity in the app. Parents can’t retrieve “Whispers” from a child’s phone without the PIN.

85

39 10/9/2019

BurnBook App

An anonymous Social Network that has become a favorite for cyber bullying.

It mandates that location services be used so that it can identify your geographic area.

From there, users choose from a list of nearby communities, most likely selecting their own middle and high schools, and then narrow down results to pages just about their classmates — and possibly themselves.

86

Cyber Bullying/Viral Shaming

It spreads like a virus

This is a PSA Web Video produced through STRUTT Central's social awareness component in their programs for girls.

87

40 10/9/2019

89

Rebecca Ann Sedwick – 12 Years Old

90

41 10/9/2019

Cyberbullying Arrests

• A 12 & 14 year old were arrested for this and other Cyberbullying posts.

91

Cyber Bullying/Viral Shaming Viral shaming through Facebook and other social media has led to suicide among multiple teenaged girls: 15-year-old Audrie Pott 17-year-old Rehtaeh Parsons 15-year-old Amanda Todd.

92

42 10/9/2019

Audrie Pott

15-year-old Audrie Pott, committed suicide eight days after a sexual assault.

She went to a party at a friends house, drank too much and passed out. When she woke she discovered her clothes were removed and there were drawings all over intimate parts of her body.

Later at school, she saw a group of students huddled around a cellphone and realized that at least one humiliating photo of her was circulating.

She was brutally cyberbullied and virally shamed over an incident she never remembered occurring. Eight days later she hung herself.

93

Rehtaeh Parsons

Rehtaeh Parsons, of Nova Scotia, committed suicide in April at the age of 17 after allegedly having been gang-raped by four boys in 2011.

Not only was she raped but a photo of the alleged attack had gone viral, spreading throughout the community and resulting in unremitting harassment.

Two 18-year-old Canadian men were arrested on August 12, 2013 and have been charged with child pornography crimes over the alleged cyber-bullying of Rehtaeh Parsons.

94

43 10/9/2019

Cyber bullying What Can Be Done - General?

Never post or forward inappropriate pictures or images of others – Don’t Participate! Try blocking the sender , if email – label it junk Don’t reply! It usually just encourages the sender. Communicate with a trusted adult. If it is serious or threatening DO NOT DELETE. Contact the authorities. They will need the original for evidence and to trace it to the sender. If you notify the Social Network they are obligated to remove the post making it difficult to prosecute.

96

Resources

www.stopbullying.gov

http://www.ncpc.org/cyberbullying

97

44 10/9/2019

Resources

http://www.pacer.org/bullying/resources/

http://cyberbullying.us/

98

Chatting, Meeting, or ????

ITIS, LLC All Rights Reserved

99

45 10/9/2019

Omegle

Omegle is a free online chat website that allows users to communicate with others without the need to register. The service randomly pairs users in one- on-one chat sessions where they chat anonymously using the handles "You" and "Stranger".

ITIS, LLC All Rights Reserved

100

Chatroulette

Chatroulette is an online chat website that pairs random people from around the world together for webcam-based conversations. Visitors to the website begin an online chat (text, audio and video) with another visitor.

ITIS, LLC All Rights Reserved 101

46 10/9/2019

Tinder

Tinder: An app that is used for hooking-up and dating. It is a location-based social discovery application that permits people to rate each other & chat between mutually interested users.

ITIS, LLC All Rights Reserved 102

A University of Kansas student has terrifying Tinder encounter

By Sophia Tulp, Ithaca College 3:34 pm EDT May 18, 2016

A University of Kansas student and sorority sister experienced a Tinder date gone horribly wrong last month when she was allegedly beaten and held against her will for six days by a man she met on the dating app.

ITIS, LLC All Rights Reserved

103

47 10/9/2019

Yubo – Tinder for Teens

104

MeetMe

• MeetMe focuses on creating new relationships for your teen but works almost exclusively to connect your teen with strangers. • Immediately after creating an account, various profiles pop up for other users of the app in the nearby area.

105

48 10/9/2019

Down This app, which used to be called Bang With Friends, is connected to Facebook. Users can categorize their Facebook friends in one of two ways: They can indicate whether or not a friend is someone they’d like to hang with or someone they are “down” to hook-up with.

ITIS, LLC All Rights Reserved 106

21 Apps Parents Should Know About

107

49 10/9/2019

Monitoring Apps

Net Nanny allows you to control your kids' internet activity remotely. Not only can you choose specific websites that you want blocked on your kids' phones; you can also block types of websites, such as ones involving dating, nudity, pornography or tobacco. You can also set it so that you will get a warning if your child types in a certain keyword, such as "suicide." SecureTeen does even more: It gives your kids call logs, which means you know who your kids are calling, and who's calling them. It even enables you to read your kids' text messages. TeenSafe may be the most advanced of all. Not only does track text messages and calls; it also pinpoints your child's exact GPS location instantly.

108

Child Safety Apps

FBI Child ID My Mobile Watchdog Net Nanny Family Tracker

Norton Family Sex Offender Search Qustodio for Families ESET Parental Control

109

50 10/9/2019

Amanda Todd’s Story Amanda was bullied viciously on Facebook where her schoolmates were invited to join a page which included her breasts as the Avatar, causing Amanda to suffer from anxiety and depression.

It started after an unknown man convinced her to expose herself online in front of a webcam. He told her she was beautiful and just wanted her to flash him. He blackmailed her (sextortion) and spread the photos around, destroying her reputation. The bulling was incessant and although she changed schools 3 times it followed her via Social Networks. On 10 October 2012, Amanda Todd committed suicide. It was just one week before her 16th birthday. 9 teens were arrested after she hung herself. View Amanda’s Story

110

Questions?

111

51