Use of Tech Tampa
Total Page:16
File Type:pdf, Size:1020Kb
Use of Technology to Stalk Phones – calls, messages, texts, pics, video Use of Technology to Stalk Cameras Global Positioning Systems (GPS) Computers Social networking sites Email & IM Spyware Sue Ryan, Program Attorney Assistive technologies www.victimsofcrime.org/src Technology is not the enemy Cell Phones How can phones be manipulated by stalkers? Criminals exploit the technology to create an advantage for themselves Calls, texts, photos, video Cell phone settings can be manipulated to act as Most of the technologies used by stalkers have listening device legitimate and legal functions Access to victim We must keep up with the criminals and Hidden device ensure our laws and policies reflect the reality of stalking GPS tracking Tracking via Cell Phones Tracking via Cell Phones Stalkers may (mis)use legitimate phone services and features to track and stalk Stalkers may also use applications and install them on to a victim’s phone to track and stalk 1 Other Family Locator Apps Location Based Services Search for: Locate Find kids, find friends Track spouse GPS Tracking Lite Family Tracker Exif: Exchangeable image file Geotagging Exif Viewers format: Descriptive data (meta- data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation. Camera GPS Geotagging 2 Disabling Geotagging Listen to Calls Locate Search “how to disable geotagging on a [phone make/model]” www.icanstalku.com Cell Phone Spyware Read text Activate messages Speaker Detecting Cell Phone Spyware Call & Text Spoofing Offender knows Gives caller ability to change number shown on caller ID or text, things that they could Battery overuse change sound of voice and to record calls only know if they and/or have access to the high data usage phone Offender has or had Clicks or sounds physical access when on calls Spoofing Text Message Spoofing Most Send text messages sites/apps anonymously offer 1 free Telespoof.com spoofed call Phonegangster.com Spoofcard.com Spooftel.com 3 Disappearing SMS & MMS Considerations for Responders Wickr , Snapchat & Facebook Slingshot: Documentation SMS & MMS • Preserve audio, SMS (text), MMS Both users need to have the app (photo, video) on the phone and separate from phone • Victims can get detailed copies of their own cellphone bills Victim Safety • Educate victims about GPS tracking, spoofing, spyware, etc. • Option for victims to get new cellphone, but maintain current cellphone Cellphones – Victim Safety Regularly ask victims about their cell phone use Global Positioning Systems Discuss spyware potential (GPS) & Locating Devices Discuss account privacy If offender has ever had access to phone: Consider completely wiping phone & restoring to factory settings (discuss potential safety risks of this action) Consider keeping phone but not using it for anything that could reveal location of victim but also using a different, safer phone (no-contract phones, donated phones) Global Positioning Systems: GPS GPS Documentation & Evidence 1. Locate device on the victim’s car 2. Tie suspect to the device Active and Variety of passive power GPS sources Small, easily hidden Map, satellite, bird’s eye views 4 GPS Documentation & Evidence Email How do stalkers use email? Financial Computer Phone Data Send email • Tracking • Apps • Equipment Monitor email software • Websites purchase • Tracking • Call-in • Real time Intercept email websites numbers tracking • Texts service charge Impersonate victim and send messages to others Email Anonymizers Disappearing Emails Sites/services that will mask the senders Send a message that “disappears” after a identity certain time period or when the viewer deletes it Email address IP address Receiver clicks on a link to the private message Some prevent screenshots or copy/paste function Disappearing Emails - Documentation Email Tracing Most self-destruct emails create a In order to determine the sender of an email, an link to send investigator needs the email’s header information. • Follow the regular steps in tracking email An email header is the information added to the beginning/top of the electronic message. Most of the “emails” are actually By default, email clients and services only show an a message on a web browser abbreviated form of the header. • Take screen shots Advice victims to keep a log to show pattern of stalking 5 Email Tracing Read from the Bottom Up The complete email header is a record of: Start at the bottom of the email header and read Who sent the email up until you find the first IP address Which network it originated from Received: from [12.10.116.2] by Which email servers processed it web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT Miscellaneous information: X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Timestamps Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) Email client From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? Encoding information, etc. To: [email protected] Some of it is useful for tracing email, some of it is not Reading the Header Find the ISP After noting the IP address of the sender you must IP addresses are assigned to providers note the date and time stamp of the email Use search engines to find the owner of the address Received: from [12.10.116.2] by www.samspade.org web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT www.dnsstuff.com X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 www.arin.net Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) www.geektools.com From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? Go to one of these sites and choose the “who To: [email protected] is” function or similar search Email – Documentation Social Networking Sites Save emails - electronic and hard copies with expanded headers Received: from [12.10.116.2] by web113110.mail.gq1.yahoo.com via HTTP; Thu, 27 Sep 2013 12:13:42 PDT X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Date: Thu, 27 Sep 2013 12:13:42 -0700 (PDT) From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? To: [email protected] Do not have victims forward emails – will alter IP address 6 How are Online Spaces Misused? Social Media + Phones + Location • Creating Fake Accounts: • Sextorition/extorition • get “around” blocking. • Harassment through • Impersonation: email, instant messaging, • Taking over accounts, or social networking Need to check settings for pretending to be victim. sites. all social media accounts on • Stalking: • Sending numerous each device used. • Gathering information and/or hateful, through search engines and public profiles. threatening messages. • Posting pictures/videos • Posting negative, online – revenge porn, harmful, or false recording assaults information SNS - Documentation Considerations for Responders Capture and save screenshots (PrntScrn) Documentation Some sites offer a “download your information” • Preserve emails electronically and service in account settings hard copy with expanded header • Do not forward emails • Screen shot social networking posts Victim Safety • Explore online presence, account security, privacy settings • Discuss freedom/safety balance • What is on other people’s pages Laptop & Web Cams Cameras 7 Software How can they be disguised? Tincam.com (Windows) Evological.com (EvoCam) (Mac) Periscope (Mac) Run in background Take images and video secretly How Cameras are Used Camera Considerations Keep track of victims – learning their routine, monitoring behaviors, etc. Equipment is inexpensive and easy to access Watch victim without being seen – be omnipresent Obtain information they otherwise wouldn’t be able to have Look for cameras or common objects in which cameras may be hidden Manipulate victim; blackmail Camera detection Scare and harass— “I’m watching and know what you are •Signal detectors doing” •Lens detectors Turning the Camera Why use video surveillance? Computers & Tablets Excellent evidence Always active Cheaper than physical surveillance Provides victims with sense of security 8 Computer Spyware Keystroke Logging Hardware See everything the victim Can be keyboard ports, special keyboards, or mouse does on the computer No software to install or configure - just plug it in Control the functioning of the Need physical access to install & remove computer Power Camera Sound Can be installed remotely or by physical accessing the computer Spyware – Victim Safety Online Victim Safety Educate victims about remote access/spyware possibilities Educate victims about availability of info Encourage victims to use a “safer” computer Not connected to the Internet Encourage victims to routinely search for Shared computers at the library or elsewhere themselves Spyware “cleaners” do not guarantee safety Discuss options for having information Removal of spyware may escalate offender’s removed behavior • Safe Shepherd: www.safeshepherd.com/advocates • Reputation.com: www.reputation.com/domesticviolence Use of Technology to Stalk © National Center for Victims of Crime 2015 Content of this presentation may be reproduced for educational www.victimsofcrime.org/src purposes with the permission of the Stalking Resource Center. Please contact the Stalking Resource Center at [email protected] or 202-467- 8700 for permission. This project was supported by Grant No. 2014-TA-AX-K056 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. 9 .