Apps Watch List

Total Page:16

File Type:pdf, Size:1020Kb

Apps Watch List MO Internet Crimes Aga¡nst Children Task Force Additional Resources - Apps Watch List SOCIAL NETWORKING There are THOUSANDS of different social networking sites. These are some of the most popular. FACEBOOK - Allows users to share status updates, photos and video and make video calls via Skype. Any user can contact any other user regardless ofwhether or not the account is marked private. Look for Slingshot (coming soon) which will be similar to Snapchat. INSTAGRAM - Allows users to post pictures and videos and have followers. Any user can contact any other user regardless of whether or not the account is marked private. TUMBLR - Shares photos, pictures, video, music, quotes, chats, links, and text. Any user can contact any other user regardless of whether or not the account is marked private. TWITTER - Shares 140 character messages, photos, and video to your followers. Any user can con- tact any other user regardless of whether or not the account is marked private. SNAPCHAT - Users snap photos and set a timer. Photos "disappea/' in 1 to 10 seconds. This doe, #+-# not prevent the recipient from screenshotting the photo, saving and distributing it. Photos do t disappear from sender's phone, they are simply stored in a different locatio APPS THAT USE WEBCAMS SKYPE - Allows users to video chat, send pictures or videos, send voice messages and lM in real time. Users can access Skype from Facebook. Kids frequently turn on the "Skype Me" functi< which allows other users to contact them - not private at all. FACETIME - Allows users to video chat and make calls. OMEGLE - The marketing tagline is 'Talk to Strangers on the Internet". Users are randomly paire with others for video or text chatting. Users are supposed to be 18 but , like any app or site, chan ing your age is easy. Very young users (5th grade) are giving this site and app a try and finding nu- dity and sexual activit CHATROULETTE - Similar to Omegle, this app pairs users with other random users. Very young us- rgg' ers (5th grade) are giving this site and app a try and finding nudity and sexual activit OOVOO - Allows users to share video content with up to L2 other users, make voice and video calls, send pictures and lM. Sometimes users are randomly sent content adult content by peers o strangers and have difficulty getting out of a conversation. See the FAQ section to resolve this is Wwwe sue. GLIDE - Users send and receive private video messages which can be retrieved at any time, ant chat one on one or in a group. Messages are stored in the cloud so they don't take up the phone's Wffi memory. This app would be used like voicemail, except with video. MESSAGING APPS KIK¿ PINGER, TANGO, TEXTPLUS, vIBER a HT.ffi, These very popular messaging apps keep text messages away from the eyes of parents. They each have different features but most allow text and pictures. Some allow users to talk to multiple people in a conversation, some provide frer calling as well. It's important to note that many of these turn a tablet, or in some cases, an iPod Touch, into a makeshift cell phone, and most can be used on a v -fi only plan - no service contract required. There are hundreds of similar apps. ,E ,',ì'/1aùr @@EIW ,.'V',-' SECRET SHARING APPS Apps like these (SECRET* right and WHISPER, left) are used by tweens and teens to anonymoush post things they feel they can't share with friends in real life. Most "secrets" have something to do with sex. Other users can comment (or bash). There are no age requirements on this app. The po- *This tential for adult offenders to be here to "listen" is significant. is the SECRET logo, but wher downloaded to Android it will appear as a mason jar with a lightening bug inside. 'üouYu3 -os¿þ HooK uP APPS ^ ---fted'xg 2u(rþn{ \slqryon, GRlflDR,\MEET24, TTNDER and DowN U rf ernat'rVØJ These apps are clearly designed for adults but we find them in use as early as junior high. Many of them use your location to determine what potential dates are in your area. DOWI accesses your Facebook contact list and hooks you up with "safe friends of friends". The potential risks wlth these app are many. Some offer the ability to send photos that wil "disappear" in 24 hours (TINDER, "Moments"), flirting and sexual content are rampant, an( they provide an excellent environment for offenders to find potential victirns in their ar, ffiw &E.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • VISUAL Message Center Smartconsole User Guide
    SmartConsole User Guide 8.0 VMC-Mxx VISUAL Message Center SmartConsole - User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright Notice Copyright © 2014 Tango/04 All rights reserved. Document date: May 2014 Document version: 1.8 Product version: 8.0 No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic mechani- cal, magnetic, optical, chemical, manual, or otherwise, without the prior written permission of Tango/04. Trademarks Any references to trademarked product names are owned by their respective companies. Technical Support For technical support visit our web site at www.tango04.com. Tango/04 Computing Group S.L. Avda. Meridiana 358, 5 A-B Barcelona, 08027 Spain Tel: +34 93 274 0051 Table of Contents Table of Contents Table of Contents.............................................................................. iii How to Use this Guide......................................................................xiii Chapter 1 Introduction ......................................................................................1 1.1. What is VISUAL Message Center?.................................................................2 1.2. How Does VISUAL Message Center Work?...................................................2 1.2.1. Collection Layer ........................................................................................3
    [Show full text]
  • IT's 10 P.M. Do You Know What Apps Your Kids Are Using?!?!?
    Instagram Facebook Twitter Snapchat Musical.ly WhatsApp kik SayAt.Me Marco Polo Monkey Ask.Fm House Party Fire Chat After School Sarahah VIDEO-MESSAGING APPS • VIDEO APPS LIKE MARCO POLO, HOUSE PARTY AND FIRECHAT ARE THE NEW CHAT ROOMS • MARCO POLO, WHICH HAS BEEN DOWNLOADED AT LEAST 10 MILLION TIMES ON THE GOOGLE PLAY STORE, TOUTS ITSELF AS A VIDEO “WALKIE-TALKIE.” YOU MAKE A VIDEO AND SEND IT. IN RESPONSE YOUR FRIEND MAKES A VIDEO. ALL THE VIDEOS LIVE IN A QUEUE; YOU ADD A VIDEO WHEN IT’S CONVENIENT. YELLOW • YELLOW, WHICH HAS BEEN CALLED “TINDER FOR TEENS” (SWIPE RIGHT IF YOU WANT TO BECOME FRIENDS WITH SOMEONE; SWIPE LEFT IF YOU DON’T), OPENS WITH A GEO-LOCATOR. THERE IS A 13-YEAR- OLD AGE MINIMUM, WHICH THERE’S NO WAY OF VERIFYING. ANONYMOUS APPS • ANONYMOUS APPS HAVE BEEN DEVELOPED FOR PEOPLE INTERESTED IN A FACELESS AND NAMELESS DOCUMENTATION OF THEIR LIVES (AS OPPOSED TO A SELFIE), DRAWING IN CHILDREN WHO LEARNED FROM EARLIER GENERATIONS ABOUT THE CONSEQUENCES OF AN OFFENSIVE ONLINE FOOTPRINT. • THERE ARE A NUMBER OF ANONYMOUS APPS ON THE MARKET — AFTER SCHOOL, SARAHAH, SAYAT.ME, MONKEY AND ASK.FM ARE SOME OF THE MOST POPULAR — ALL OF THEM PROMISING THE SAME FEATURE: SPILL INTIMATE FEELINGS ABOUT YOURSELF OR, ON THE FLIP SIDE, SPREAD RUMORS AND ATTACK FRIENDS, WITHOUT ANY TRACE OF WHO SAID WHAT. EPHEMERAL APPS • MANY ADULTS HAVE HEARD OF SNAPCHAT AND INSTAGRAM STORIES, BUT WHAT ABOUT LIVE.LY, A RISING LIVE-STREAMING APP WITH A LARGE TEENAGE AUDIENCE? • ALL THREE WORK LIKE A DISAPPEARING MAGIC ACT.
    [Show full text]
  • Digital Filtering in Saudi Arabia
    Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia Fatemah Alharbi Michalis Faloutsos Taibah University, Yanbu University of California, Riverside Nael Abu-Ghazaleh University of California, Riverside Abstract (a) traditional Internet filtering on websites; and (b) access to mobile applications. The study spans the period from March Our study makes a rare positive observation: Saudi Arabia 2018 to April 2020, with three separate measurements, one in has been opening its digital borders since 2017 in a delib- each calendar year. Our goal is to answer the three questions: erate new era towards openness. In this paper, we present a (a) “what content is filtered?", (b) “how is filtering imple- comprehensive longitudinal study of digital filtering, which mented?", and (c) “how does filtering evolve over time in we define to include both mobile apps and website access, response to geopolitical conditions?" in Saudi Arabia over a period of three years. Our results show that Saudi Arabia has indeed made significant progress We pursue a mutli-pronged strategy as follows. towards opening its digital borders: (a) the use of mobile 1. Quantification: What is filtered? We provide a fairly ex- applications has been significantly permitted; and (2) web ac- tensive study on the accessibility of both mobile apps and cess is becoming more open. We use: (a) 18 social media and websites from within Saudi Arabia and its evolution over communications mobile apps such as WhatsApp, Facetime, time. Our results show significant progress towards the open- and Skype; and (b) Alexa’s top 500 websites in 18 different ing of the country’s digital borders.
    [Show full text]
  • Singularityce User Guide Release 3.8
    SingularityCE User Guide Release 3.8 SingularityCE Project Contributors Aug 16, 2021 CONTENTS 1 Getting Started & Background Information3 1.1 Introduction to SingularityCE......................................3 1.2 Quick Start................................................5 1.3 Security in SingularityCE........................................ 15 2 Building Containers 19 2.1 Build a Container............................................. 19 2.2 Definition Files.............................................. 24 2.3 Build Environment............................................ 35 2.4 Support for Docker and OCI....................................... 39 2.5 Fakeroot feature............................................. 79 3 Signing & Encryption 83 3.1 Signing and Verifying Containers.................................... 83 3.2 Key commands.............................................. 88 3.3 Encrypted Containers.......................................... 90 4 Sharing & Online Services 95 4.1 Remote Endpoints............................................ 95 4.2 Cloud Library.............................................. 103 5 Advanced Usage 109 5.1 Bind Paths and Mounts.......................................... 109 5.2 Persistent Overlays............................................ 115 5.3 Running Services............................................. 118 5.4 Environment and Metadata........................................ 129 5.5 OCI Runtime Support.......................................... 140 5.6 Plugins.................................................
    [Show full text]
  • Closed Groups, Messaging Apps & Online
    FIRST DRAFT'S ESSENTIAL GUIDE TO Closed Groups, Messaging Apps & Online Ads November 2019 TABLE OF CONTENTS Introduction 5 CHAPTER 1 Understanding ad libraries 13 CHAPTER 2 Facebook groups 21 CHAPTER 3 Closed messaging apps 27 CHAPTER 4 Ethical considerations 37 Conclusion 43 3 ABOUT THE AUTHORS Carlotta Dotto is a research reporter at First Draft, specialising in data-led investigations into global information disorder and coordinated networks of amplification. She previously worked with The Times’ data team and La Repubblica’s Visual Lab, and written for a number of publications including The Guardian, the BBC and the New Internationalist. Rory Smith is a senior investigator at First Draft where he researches and writes about information disorder. Before joining First Draft, Rory worked for CNN, Vox, Vice and Introduction Truthout, covering various topics from immigration and food policy to politics and organized crime. Claire Wardle currently leads the strategic direction and research for First Draft. In 2017 she co-authored the seminal report, Information Disorder: An interdisciplinary Framework for Research and Policy, for the Council of Europe. Previous to that she was a Fellow at the Shorenstein Center for Media, Politics and Public Policy at Harvard's Kennedy School, the Research Director at the Tow Center for Digital Journalism at Columbia University Graduate School of Journalism and head of social media for the United Nations Refugee Agency. She was also the project lead for the BBC Academy in 2009, where she designed a comprehensive training program for social media verification for BBC News, that was rolled out across the organization.
    [Show full text]
  • Network and Device Forensic Analysis of Android Social-Messaging Applications
    DIGITAL FORENSIC RESEARCH CONFERENCE Network And Device Forensic Analysis Of Android Social-Messaging Applications By Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger and Jason Moore Presented At The Digital Forensic Research Conference DFRWS 2015 USA Philadelphia, PA (Aug 9th - 13th) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development. http:/dfrws.org Network'and'device'forensic'analysis'of'' Android'socialOmessaging'applica=ons' Daniel'Walnycky,'Ibrahim'Baggili,'Andrew'Marrington,' Jason'Moore,'Frank'Brei=nger' Graduate'Research'Assistant,'UNHcFREG'Member' Presen=ng'@'DFRWS,'Philadelphia,'PA,'2015' Agenda' • Introduc=on' • Related'work' • Methodology' • Experimental'results' • Discussion'and'conclusion' • Future'work' • Datapp' 2' Introduc=on' Tested'20'Android'messaging'apps'for'“low'hanging'fruit”'a.k.a'unencrypted'data:' • on'the'device,'in'network'traffic,'and'on'server'storage' Found'eviden=ary'traces:'passwords,'screen'shots,'text,'images,'videos,'audio,'GPS' loca=on,'sketches,'profile'pictures,'and'more…' 3' Related'work' • Forensic'value'of'smartphone'messages:' • Smartphones'may'contain'the'same'rich'variety'of'digital'evidence'which'might'be'found'on'a'computer'
    [Show full text]
  • Iphone Text Messages Read Receipt
    Iphone Text Messages Read Receipt When Gabriel attune his manages double-talk not blankety-blank enough, is Morgan lengthening? Undulant Roscoe sideswiping, his Cinzano frap crumbling boundlessly. Dwain delete her pyracanth collectively, reviewable and remonstrant. Read by francis navarro, letting us about with or text messages to such content and hold down according to appear in the advantages of the only stub undefined methods can About Direct Messages Twitter Help Center. In a lot more timely manner as an iphone text messages read receipt does the message read on group conversation participants. How they Disable iMessage Read Receipts on iPhone. With iOS 10 you get to verify whether penalty not you'll sleep read receipts with each. How close Not Show When Text you Read write an iPhone. Received the message with an acknowledged DLR delivery receipt. How to surge Off Read Receipts on iPhone for iMessage. The Messages app on the iPhone is project of sending and. You have read receipts on your negativity iphone text messages read receipt? Why are iMessages being happy as SMS Text Messages. Or not aware has received or read your most recent message. I don't care much means people give I trash the message but didn't respond. If i send both text via iMessage to another iPhone you will inspire the. How to Secretly Open iMessages Without Triggering Read. This WhatsApp status trick involves 'Read receipt' log of the messenger These receipts are upcoming check marks that appear friendly to each message you list If raw Read receipts are enabled then the sender will swarm to cough when hisher message is read.
    [Show full text]
  • SMS Or Messaging Apps
    EdTech Hub About this document Recommended Jordan, K. & Mitchell, J. (2020). ​Messaging apps, SMS & social media: Rapid citation Evidence Review. ​The EdTech Hub. DOI: 10.5281/zenodo.4058181 Licence Creative Commons Attribution 4.0 International https://creativecommons.org/licenses/by/4.0/​. You — dear readers — are free to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) for any purpose, even commercially. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. Identifiers 10.5281/zenodo.4058181 Notes You can contact EdTech Hub here: ​https://edtechhub.org/hello/​ . Version 1 This publication is one part of a series of rapid evidence reviews that has been produced by the EdTech Hub. The purpose of the rapid evidence reviews is to provide education decision-makers with accessible evidence-based summaries of good practice in specific areas of EdTech. They are focused on topics which are particularly relevant in the context of widespread global challenges to formal schooling as a result of Covid-19. All the rapid evidence reviews are available at edtechhub.org. Messaging apps, SMS & social media - a rapid evidence review EdTech Hub Abbreviations and acronyms ASER Annual Status of Education Report AT Assistive Technology EdTech Educational Technology EGMA Early Grade Mathematics Assessment ERIC Education Resources
    [Show full text]
  • Inman Real Estate News - Web Tools Open New Lines of Communicat
    Inman Real Estate News - Web tools open new lines of communicat... http://www.inman.com/printer.aspx?ID=62929 Back Send to Printer Web tools open new lines of communication for agents Part 1: Real estate technology buzz Monday, April 23, 2007 By Glenn Roberts Jr. Inman News Editor's note: In an increasingly competitive marketplace, brokers and agents are trying new things to gain an edge. In this four-part series, Inman News offers a look at new tools available for Realtors, including online communication plug-ins, online video and single-property Web site marketing. Maybe you haven't used Jaxtr, Jott, Meebo, Pinger and Twitter. In fact, maybe you haven't heard of them. They are not: alien planets discovered on "Star Trek"; nicknames for illicit pharmaceuticals; new cable television networks; or Pokemon pals. They are: new ways to communicate. Instant-messaging, text-messaging, voice-messaging and e-mail-messaging technologies are a hotbed for communications mashups, and these companies among others are supplying the "always on" business of real estate with plenty of tools to instantly reach out and text, call, IM or e-mail someone at all hours. While these communication tools do offer more opportunities to generate leads and keep in touch with clients, some real estate professionals say that managing all of these communications channels can be a challenge and a time drain. Jim Duncan, a third-generation Realtor for Century 21 Manley in Charlottesville, Va., who maintains a blog at RealCentralVA.com and has amassed a collection of 13 e-mail addresses, four instant-messaging addresses and a voice-over-Internet account through Skype.
    [Show full text]