10/9/2019
Teens & Technology Unintended Consequences
1
Your Instructor
Jim Dill, Deputy Chief, Retired PA Office of Attorney General & President Innovative Technology & Investigative Solutions, LLC
[email protected] 717-884-8167
3
1 10/9/2019
PDF Copy of Presentation
https://bit.ly/TeensandTech
4
Goals & Objectives
Look at the darker side of common technology issues as they relate to the juveniles, advocates, courts, police & parents. • Sexting & Sextortion • Cyber Bullying & Viral Shaming Look at some of the everyday technologies that lends itself to these issues. Goal - Raise your awareness!! Goal - Demonstrate methods to prevent or mitigate their harmful consequences.
5
2 10/9/2019
Ultimate Goal Safety
6
I Need Your Participation!
In the form of: Questions???? Experiences Stories Ideas
ITIS, LLC All Rights Reserved
7
3 10/9/2019
Survey
On a Scale from 1 to 5 rate your understanding of Social Media? How many are NOT on Facebook? How many participate on Social Networks? •Your Family Members?
ITIS, LLC All Rights Reserved
8
Let’s begin by looking at the technologies that create some of the problems
9
4 10/9/2019
Wireless Subscribers
2017 CTIA Wireless Snapshop
10
Cell Phones Capabilities & Convergence of Technologies
Make & receive calls Download & play TV & Movie Send & receive text messages A cellular modem for your laptop Send & receive e-mail Wireless LAN allowing up to 5 devices to Surf the web use the phone’s modem for Internet access Take & store photos E-Book reader Take & store videos Alarm monitor & DVR Record & store audio notes Credit card replacement Contact Manager Bluetooth Device GPS Device Calendar Store Documents • Plus hundreds of thousands of iPhone & other phone apps! Play music Video game player
11
5 10/9/2019
Keep Your Data Safe
Password Protect Your Phones!
12
Cell Phone Security
13
6 10/9/2019
Cell Phone Hijacking!
Actual Phone Hijacking
Internet resource on cell phone spy software: http://acisni.com/
14
Negative Impact
These simple indispensable devices have become part of our everyday life but can easily create an atmosphere of: Threatening behavior Unwanted advances Harassment Sexting Sextortion Cyber Bullying
All directed at another using cellular and computer communications.
15
7 10/9/2019
EXIF Data
17
EXIF - Exchangeable Image File Format
Camera settings and scene information are recorded by the camera into the image file. Often called Metadata. Most photo viewers can read EXIF data Most cell phone cameras and many newer digital cameras insert geo-location information
18
8 10/9/2019
EXIF Data
20
EXIF Data with GPS
DEMO DEMO2
21
9 10/9/2019
EXIF Location Data Demo Let’s look at what happens when we post these pictures at some photo sharing sites.
EXIF Newsflash Report
http://www.flickr.com/map
22
Solutions Turn off Location Services on phone’s camera.
iPhone Android
23
10 10/9/2019
Solutions
• Set security on photo sharing site. • Remove EXIF information • With Window’s Vista or 7: • Right click photo • Select: Properties • Select: Details • Select: Remove Properties & Personal Detail • Choose to remove all or just GPS data • Or use an EXIF Remover App such as “EXIF Cleaner” DEMO
24
Location Based Services
25
11 10/9/2019
Geo-Location Geo-Tagging involves adding location data to an image, text message, video or app.
That location info can be GPS, WPS (Wi-Fi Positioning System), Cellular Triangulation, or XPS (a combination of all 3).
Most new cameras and cell phones default to adding geo- tagging to your photos.
Many smartphone applications incorporate geo-tagging.
27
Wi-fi Positioning System
28
12 10/9/2019
WI-Fi Positioning System (WPS)
Developed by Skyhook Wireless Gathered location Wireless Local Area Networks (WLAN) through wardriving Includes >100 million Wi-Fi access points & is constantly updated With WPS no GPS hardware required Was primary location engine for Google Maps on the iPhone Tracking built into most Internet Browsers
29
iPhone
The iPhone now remembers everywhere the user goes by default.
Apple has buried this function very deep. Settings > Privacy > Location Services > System Services > Frequent Locations (Significant Locations iOS 11).
30
13 10/9/2019
Wi-Fi Positioning System (WPS)
This car is equipped with Wi-Fi–sniffing hardware to record the names and MAC addresses of routers to improve Google location-specific services.
31
Android Phone – Location History
If Location History is on your Android phone keeps a history of locations you have been.
https://www.google.com/maps/timeline?pb
ITIS, LLC All Rights Reserved 32
14 10/9/2019
Location History - Android
To turn off Location History go to: Settings, Location, Google Location Reporting, Location History and slide switch to off.
33
Geo-Location
Social Networks go mobile • Using smartphone applications • Facebook Places, Foursquare, • Swarm, and many others including Twitter • Facebook Location History
34
15 10/9/2019
Gaming MMORPG - A Massively Multiplayer Online Role- Playing Game such as World of Warcraft. •Virtual Worlds – REAL Crimes! •Drug and drug deals (Kids using Adderall) •Child pornography •Child predators •Terrorism… •Paris ISIS terrorists employed Sony PS4 to communicate, and used encrypted messaging apps Telegram and WhatsApp.
35
SMS & MMS Through the Cellular Provider Or Using a Mobile App
36
16 10/9/2019
Text Messaging – Science Through the Cellular Provider
The exchange of brief written messages between mobile phones over cellular networks - AKA: Short Message Service (SMS). It is limited to 160 characters/message. Use Cellular Control Channel MMS - Multimedia Messaging Service includes messages containing image, video, and sound content. This is the common platform many use to text and comes with all cell phones.
37
Text Messaging How It Works
• SMS is a store-and-forward service, meaning that when you send a text message to a friend, the message does not go directly to your friend's cell phone. • Messages are stored in phone either in memory, on the SIM card or on a micro SD card until deleted (and beyond)! Even deleted messages are recoverable. • If you use the carrier’s text message service call details show up on your Online Billing
38
17 10/9/2019
Proprietary Messaging Apps
• Both the Sender & Receiver must have the app. • These are texting apps outside of the Carriers control and broadcast over the Internet using Wi-Fi or the devices data plan. • Many provide secret ways to hide the messages on the phone. Even the App may be deceiving one actually disguised as flash light app. • Don’t need a phone to send a text. • Some even “claim” to be self destructing!
ITIS, LLC All Rights Reserved 39
Proprietary Messaging Services WhatsApp Jaxtr Telegram Viber Text Plus Shady SMS – a hidden sexting app that only you TxtDrop can see or open. To open Hide My Text you need to dial a code. iMessenger Shady SMS SMS Calculator Many Others
Apps use a smartphone's data plan or Wi-Fi to transmit and receive messages, a feature that appeals to individuals looking to avoid text messaging by phone service providers.
40
18 10/9/2019
Chat Feature on Kids Apps
Many Apps like Musical.ly have a chat feature turned on by default. Any user can comment on another user’s posting Predators have taken advantage of the chat feature to contact and prey on teens and preteens.
GMA Report
41
Musical.ly is now TikTok
TikTok, also known as Douyin in China, is a Chinese music video platform and social network that was launched in September 2016 by Zhang Yiming, founder of Toutiao. Wikipedia
ITIS, LLC All Rights Reserved 42
19 10/9/2019
43
Self Destructing Text Messaging Apps
• Self Destructing text messages have given kids the false impression that they can sext safely. They include:
• Snapchat, Wickr, Tiger Text, Facebook Messenger, Dust, and others allow you to set a timer which will cause the message to be deleted at a predetermined interval
44
20 10/9/2019
Self Destructing Messaging Apps
Snapchat Easy to Defeat
45
Easy Ways to Defeat Some Self Destructing Messaging Apps
• Take a screenshot (although some apps will notify the Sender). • Get a friend to take a picture before the message expires. • After receiving a message, but before opening, copy file to computer. • Via forensic software. Photos don’t really disappear they are just marked as not to be viewed.
ITIS, LLC All Rights Reserved
46
21 10/9/2019
How to defeat screenshot detection Once you received the Snapchat put phone in airplane mode. Open Snapchat & take screenshot. Log off & close app. Go to Application Manager & clear data. Take phone out of airplane mode Log back into Snapchat – photo won’t even be opened.
ITIS, LLC All Rights Reserved 47
SnapHack App
48
22 10/9/2019
Snapchat More than photos & videos SnapCash • Snapcash is an online money transfer service offered by Snapchat. • The actual business platform is run by Square Up. • Snapcash can be used to transfer money between Snapchat users using a linked, U.S. issued Visa or MasterCard debit card only. Yolo • On Yolo is an app that allow you to anonymously ask questions to any other user. You can also share your reply on Snapchat.
ITIS, LLC ALL RIGHTS RESERVED
49
Snap Map
In June of 2017 Snapchat introduced a new feature called Snap Map that connects to your phone’s GPS. Feature automatically (unless you’ve activated ghost mode) shows where you are on a map to anyone who is on your friends list and posts can possibly seen publicly depending on your settings!!
50
23 10/9/2019
Dust
ITIS, LLC ALL RIGHTS RESERVED
51
Confide
The service enables users to send out fleeting messages that appear one line at a time to safeguard the application against screenshot saving.
ITIS, LLC ALL RIGHTS RESERVED
52
24 10/9/2019
Facebook Messenger Secret Conversation
• Available for iOS or Android • Encryption IS NOT the default mode it must be activated. • Doesn’t encrypt previous messages. • Does not work with Group Messages. • Has a self-destruct feature that can be set from 5 seconds to 1 day
• DemoITIS, LLC ALL RIGHTS RESERVED
53
Where Texting Goes Wrong Implications for Child, Family, Police & Judiciary
54
25 10/9/2019
Sexting Statistics Content Author: Statistic Brain Date research was conducted: April 26, 2016
http://www.statisticbrain.com/sexting-statistics/
56
Superintendent: Nude photos scandal involves several hundred students
Author: Dana Clemens, Weekend anchor/Multimedia Journalist , [email protected] This wasn’t just a massive sexting scandal involving high school kids: this was a veritable collectibles franchise. With 351 sexually explicit images getting passed around Canon City High School in southern Colorado, US, the kids were trading them like baseball cards, Fremont County District Attorney Thom LeDoux said last week. The sexting apocalypse exploded, when Superintendent George Welsh initially estimated that half the school was involved – that’s about 500 students, including some eighth graders. Police said students used a mobile phone app that hid the photos.
57
26 10/9/2019
Where Do Predator’s Get Their Photos? • Teens are supplying them! • According to the National Center for Missing and Exploited Children (NCMEC) of the more than 130 million images containing child pornography examined since 2002 by NCMEC, one in four were initially posted by minors themselves, said John Sheehan, executive director of the organization. • In a search lasting just 40 hours, the Internet Watch Foundation found 12,224 self-generated images of teenagers on 70 pedophilic websites.
58
Sexting Many teens don’t look at long term consequences when sexting. Many times it is a result of peer pressure or bullying It can and does lead to stalking, viral shaming, cyber- bullying, sextortion & suicide. Plain & simple – Sexting can dramatically damage one’s life and self esteem.
Jessica Logan Story
59
27 10/9/2019
60
Other Sexting Issues SMS Abbreviations Deciphering Text Messages • Abbreviations and acronyms are extensively used in Text & Instant Messaging. • Emoticons – symbols used to display feelings
GNOC • Get Naked On Camera KPC • Keep Parents Clueless PIR • Parents In the Room
61
28 10/9/2019
Drug Emoji Examples
ITIS, LLC ALL RIGHTS RESERVED
62
X-Rated Emoji
ITIS, LLC All Rights Reserved 63
29 10/9/2019
Text Messaging & Instant Messaging Lingo
Good sources to help decode Text Messaging acronyms and emoticons:
www.netlingo.com/acronyms.php https://www.urbandictionary.com/
64
Other Ways Kids Fool Parents*
o Clearing the browser history. o Close/minimize browser when parent walked in. o Hide or delete IMs or videos. o Lie or omit details about online activities. o Use a computer your parents don’t check. o Use phone apps made to hide things from parent’s view. o Use private browsing modes. o Create a private email address unknown to parents. o Create duplicate/fake social network profiles. Many Parents are just intimated by the technology!
*McAfee – The Digital Divide June 2013
65
30 10/9/2019
Title 18 § 6321
66
The Law in PA Title 18 § 6321. Transmission of sexually explicit images by minor (Amended 12/2012). (Act 198)
• Currently, in Pennsylvania, sending explicit photographs by minors, ages 12 to 17, a misdemeanor or summary offense, rather than a felony. • Only for first-time juvenile offenders • After the first offense it falls under the child pornography laws • Juvenile gets labeled as a sexual predator
ITIS, LLC All Rights Reserved 67
31 10/9/2019
Sexting-What Can Be Done
Technically – parental controls & spy apps - good idea??? Parental involvement is key • Educate your teen respectfully. • Explain the long term consequences and that it is a crime. • Keep the device age appropriate • If your child receives an inappropriate message – DON’T DELETE, call the authorities • Trust but verify! – Speak with your child… • Take inventory- look at all the gadgets that can take or store photos or videos, these can include: cell phones, social networking sites, video game consoles (X-Box, WII), IPods, mp3 players etc. • Look for Apps that can conceal or password protect messages
68
Not just a cell phone issue
69
32 10/9/2019
Definition & Case Studies •Sextortion - Extortion using digital sexual photos/videos as blackmail
• Children across the world, some as young as 8 years old and many in the U.S., were blackmailed into performing sexual acts online and even forced into self-harming, according to Scotland Yard.
• Over the past two years, at least 424 children have become victims of the blackmail, leading to seven people taking their own lives, according to new research published today by the Child Exploitation and Online Protection Centre (CEOP), a police agency in the United Kingdom.
70
Sextortion – Case Studies
• A Case of ‘Sextortion’ Cons Like ‘Bieber Ruse’ Targeted Minor Girls – FBI Website February 2013 - Christopher Patrick Gunn, 31, of Montgomery, Alabama, was sentenced to 35 years in prison for producing child pornography through a massive online sextortion scheme. Gunn pretended to be the teen pop star on several interactive video chat services. When Gunn convinced girls he was the singer, he offered them free concert tickets or backstage passes in exchange for topless photos or webcam videos. Gunn employed these tactics for more than two years! • Hacker blackmailed over 350 women into stripping on their webcams, FBI Website January 2013 • Brokerage fires assistant accused in ‘sextortion’ of client-Sep 13, 2013 • 15 year old Amanda Todd’s suicide
71
33 10/9/2019
Sextortion – Other Case Studies
Miss Teen USA Sextortion Case: 19-Year-old Arrested for Allegedly Hacking Cassidy Wolf
by NATALIE FINN Thu., Sep. 26, 2013– E Online
Jared James Abrahams of Temecula, Calif., has been arrested and charged with extortion and cybercrimes for allegedly hacking into Wolf's computer and threatening to go public with nude photos purportedly taken on her compromised webcam if she didn't comply with his demands.
In March 2013, the 19-year-old beauty queen claimed that she being targeted by a hacker who claimed to have stolen nude photos of her from her web cam and computer.
72
Sextortion What Can You Do?
• Don’t share intimate images! • But if you already did - get them deleted! • Don’t take for granted that your computer’s anti-virus software is a guarantee against intrusions. • Cover your webcam when not in use. • Don’t open attachments without independently verifying that they were sent from someone you know. • If your computer has been compromised and you are receiving sextortion threats, don’t be afraid to talk to your parents or to call law enforcement.
75
34 10/9/2019
76
Cyber Bullying/Viral Shaming Definition Cyber bullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices, including cell phones.
The American Academy of Child and Adolescent Psychiatry finds children who are bullied experience suffering that can interfere with their social and emotional development, and harm school performance.
77
35 10/9/2019
Bullies use anonymity to torment their victims
Anonymous communication platforms and the pre-teen-to- teenage brain are two things that don’t mix all that well. Just look at Ask.fm, for example, the social Q&A platform whose shield of anonymity led to cyberbullying that was later cited as a contributing factor in well over half a dozen suicides.
78
Anonymous Networks & Apps
• National School Safety and Security Services reviewed more than 800 threats reported in the media during the first half of the 2014-2015 school year and found that about one-third were sent electronically using text message, social media, email or other online means. Threats included bomb scares, shootings, even terrorism. • Cyber Bullying has skyrocketed! • Use of anonymous social networks and apps has been a leading contributor. • Applications such as Burnbook, Afterschool, YikYak, Whisper and Kik are examples of what students are using.
79
36 10/9/2019
Ask.FmVictims
• 14-year old Hannah Smith took her own life after receiving abusive messages from other users on the site: “drink bleach”; “go get cancer”; and “go die”. • 16-year old Floridian Jessica Laney was found dead in her home after bullying on Ask.fm — one commenter had even asked “can you kill yourself already?” Others had called her “fat” and “a loser.” • 15-year-old Ciara Pugsley committed suicide after being taunted by anonymous posters on the site who called her “slut” and “ugly.” • 13-year old Erin Gallagher, who faced vicious bullying about her weight and looks, committed suicide.
80
Anonymous Messaging Apps
After School
Other Anonymous Chat Apps
ITIS, LLC All Rights Reserved
81
37 10/9/2019
YikYak Anonymous Social Chat Site
YikYak banned as schools grapple with toxic anonymous social chat. Some Chicago schools have banned the location-based mobile app, causing the developers to turn it off throughout the city as they seek a way to keep it off of school grounds. YikYak has lead to multiple school lockdowns in the wake of bomb threats, as well as a new way to perpetrate cyberbullying.
82
YikYak in the News
83
38 10/9/2019
ITIS, LLC All Rights Reserved Secret 2.0
When Secret launched, it quickly became the most talked-about new social network in Silicon Valley. Like other ‘"anonymish" social networks, it offers a compelling mix of sex, drugs, and intrigue.
84
Anonymous Social Networking App Whisper
Whisper is a social networking service that relies on images and anonymity to create connections and conversations. Users are asked to set a username and PIN. You can respond to a message publicly or privately, choosing a public anonymous post or a private pseudonymous chat. Users don't have a public identity in the app. Parents can’t retrieve “Whispers” from a child’s phone without the PIN.
85
39 10/9/2019
BurnBook App
An anonymous Social Network that has become a favorite for cyber bullying.
It mandates that location services be used so that it can identify your geographic area.
From there, users choose from a list of nearby communities, most likely selecting their own middle and high schools, and then narrow down results to pages just about their classmates — and possibly themselves.
86
Cyber Bullying/Viral Shaming
It spreads like a virus
This is a PSA Web Video produced through STRUTT Central's social awareness component in their programs for girls.
87
40 10/9/2019
89
Rebecca Ann Sedwick – 12 Years Old
90
41 10/9/2019
Cyberbullying Arrests
• A 12 & 14 year old were arrested for this and other Cyberbullying posts.
91
Cyber Bullying/Viral Shaming Viral shaming through Facebook and other social media has led to suicide among multiple teenaged girls: 15-year-old Audrie Pott 17-year-old Rehtaeh Parsons 15-year-old Amanda Todd.
92
42 10/9/2019
Audrie Pott
15-year-old Audrie Pott, committed suicide eight days after a sexual assault.
She went to a party at a friends house, drank too much and passed out. When she woke she discovered her clothes were removed and there were drawings all over intimate parts of her body.
Later at school, she saw a group of students huddled around a cellphone and realized that at least one humiliating photo of her was circulating.
She was brutally cyberbullied and virally shamed over an incident she never remembered occurring. Eight days later she hung herself.
93
Rehtaeh Parsons
Rehtaeh Parsons, of Nova Scotia, committed suicide in April at the age of 17 after allegedly having been gang-raped by four boys in 2011.
Not only was she raped but a photo of the alleged attack had gone viral, spreading throughout the community and resulting in unremitting harassment.
Two 18-year-old Canadian men were arrested on August 12, 2013 and have been charged with child pornography crimes over the alleged cyber-bullying of Rehtaeh Parsons.
94
43 10/9/2019
Cyber bullying What Can Be Done - General?
Never post or forward inappropriate pictures or images of others – Don’t Participate! Try blocking the sender , if email – label it junk Don’t reply! It usually just encourages the sender. Communicate with a trusted adult. If it is serious or threatening DO NOT DELETE. Contact the authorities. They will need the original for evidence and to trace it to the sender. If you notify the Social Network they are obligated to remove the post making it difficult to prosecute.
96
Resources
www.stopbullying.gov
http://www.ncpc.org/cyberbullying
97
44 10/9/2019
Resources
http://www.pacer.org/bullying/resources/
http://cyberbullying.us/
98
Chatting, Meeting, Dating or ????
ITIS, LLC All Rights Reserved
99
45 10/9/2019
Omegle
Omegle is a free online chat website that allows users to communicate with others without the need to register. The service randomly pairs users in one- on-one chat sessions where they chat anonymously using the handles "You" and "Stranger".
ITIS, LLC All Rights Reserved
100
Chatroulette
Chatroulette is an online chat website that pairs random people from around the world together for webcam-based conversations. Visitors to the website begin an online chat (text, audio and video) with another visitor.
ITIS, LLC All Rights Reserved 101
46 10/9/2019
Tinder
Tinder: An app that is used for hooking-up and dating. It is a location-based social discovery application that permits people to rate each other & chat between mutually interested users.
ITIS, LLC All Rights Reserved 102
A University of Kansas student has terrifying Tinder encounter
By Sophia Tulp, Ithaca College 3:34 pm EDT May 18, 2016
A University of Kansas student and sorority sister experienced a Tinder date gone horribly wrong last month when she was allegedly beaten and held against her will for six days by a man she met on the dating app.
ITIS, LLC All Rights Reserved
103
47 10/9/2019
Yubo – Tinder for Teens
104
MeetMe
• MeetMe focuses on creating new relationships for your teen but works almost exclusively to connect your teen with strangers. • Immediately after creating an account, various profiles pop up for other users of the app in the nearby area.
105
48 10/9/2019
Down This app, which used to be called Bang With Friends, is connected to Facebook. Users can categorize their Facebook friends in one of two ways: They can indicate whether or not a friend is someone they’d like to hang with or someone they are “down” to hook-up with.
ITIS, LLC All Rights Reserved 106
21 Apps Parents Should Know About
107
49 10/9/2019
Monitoring Apps
Net Nanny allows you to control your kids' internet activity remotely. Not only can you choose specific websites that you want blocked on your kids' phones; you can also block types of websites, such as ones involving dating, nudity, pornography or tobacco. You can also set it so that you will get a warning if your child types in a certain keyword, such as "suicide." SecureTeen does even more: It gives your kids call logs, which means you know who your kids are calling, and who's calling them. It even enables you to read your kids' text messages. TeenSafe may be the most advanced of all. Not only does track text messages and calls; it also pinpoints your child's exact GPS location instantly.
108
Child Safety Apps
FBI Child ID My Mobile Watchdog Net Nanny Family Tracker
Norton Family Sex Offender Search Qustodio for Families ESET Parental Control
109
50 10/9/2019
Amanda Todd’s Story Amanda was bullied viciously on Facebook where her schoolmates were invited to join a page which included her breasts as the Avatar, causing Amanda to suffer from anxiety and depression.
It started after an unknown man convinced her to expose herself online in front of a webcam. He told her she was beautiful and just wanted her to flash him. He blackmailed her (sextortion) and spread the photos around, destroying her reputation. The bulling was incessant and although she changed schools 3 times it followed her via Social Networks. On 10 October 2012, Amanda Todd committed suicide. It was just one week before her 16th birthday. 9 teens were arrested after she hung herself. View Amanda’s Story
110
Questions?
111
51