Use of Technology to Stalk
Phones – calls, messages, texts, pics, video Use of Technology to Stalk Cameras Global Positioning Systems (GPS)
Computers
Social networking sites
Email & IM
Spyware Sue Ryan, Program Attorney Assistive technologies www.victimsofcrime.org/src
Technology is not the enemy Cell Phones
How can phones be manipulated by stalkers? Criminals exploit the technology to create an advantage for themselves Calls, texts, photos, video Cell phone settings can be manipulated to act as Most of the technologies used by stalkers have listening device legitimate and legal functions Access to victim We must keep up with the criminals and Hidden device ensure our laws and policies reflect the reality of stalking GPS tracking
Tracking via Cell Phones Tracking via Cell Phones
Stalkers may (mis)use legitimate phone services and features to track and stalk
Stalkers may also use applications and install them on to a victim’s phone to track and stalk
1 Other Family Locator Apps Location Based Services
Search for:
Locate
Find kids, find friends
Track spouse
GPS Tracking Lite
Family Tracker
Exif: Exchangeable image file Geotagging Exif Viewers format: Descriptive data (meta- data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation.
Camera GPS Geotagging
2 Disabling Geotagging Listen to Calls Locate Search “how to disable geotagging on a [phone make/model]”
www.icanstalku.com Cell Phone Spyware
Read text Activate messages Speaker
Detecting Cell Phone Spyware Call & Text Spoofing
Offender knows Gives caller ability to change number shown on caller ID or text, things that they could Battery overuse change sound of voice and to record calls only know if they and/or have access to the high data usage phone
Offender has or had Clicks or sounds physical access when on calls
Spoofing Text Message Spoofing
Most Send text messages
sites/apps anonymously
offer 1 free Telespoof.com spoofed call Phonegangster.com
Spoofcard.com Spooftel.com
3 Disappearing SMS & MMS Considerations for Responders
Wickr , Snapchat & Facebook Slingshot: Documentation SMS & MMS • Preserve audio, SMS (text), MMS Both users need to have the app (photo, video) on the phone and separate from phone • Victims can get detailed copies of their own cellphone bills
Victim Safety • Educate victims about GPS tracking, spoofing, spyware, etc. • Option for victims to get new cellphone, but maintain current cellphone
Cellphones – Victim Safety
Regularly ask victims about their cell phone use Global Positioning Systems Discuss spyware potential (GPS) & Locating Devices Discuss account privacy
If offender has ever had access to phone:
Consider completely wiping phone & restoring to factory settings (discuss potential safety risks of this action)
Consider keeping phone but not using it for anything that could reveal location of victim but also using a different, safer phone (no-contract phones, donated phones)
Global Positioning Systems: GPS GPS Documentation & Evidence
1. Locate device on the victim’s car 2. Tie suspect to the device
Active and Variety of passive power GPS sources Small, easily hidden Map, satellite, bird’s eye views
4 GPS Documentation & Evidence Email
How do stalkers use email? Financial Computer Phone Data Send email
• Tracking • Apps • Equipment Monitor email software • Websites purchase • Tracking • Call-in • Real time Intercept email websites numbers tracking • Texts service charge Impersonate victim and send messages to others
Email Anonymizers Disappearing Emails
Sites/services that will mask the senders Send a message that “disappears” after a identity certain time period or when the viewer deletes it Email address
IP address Receiver clicks on a link to the private message
Some prevent screenshots or copy/paste function
Disappearing Emails - Documentation Email Tracing
Most self-destruct emails create a In order to determine the sender of an email, an link to send investigator needs the email’s header information. • Follow the regular steps in tracking email An email header is the information added to the beginning/top of the electronic message. Most of the “emails” are actually By default, email clients and services only show an a message on a web browser abbreviated form of the header. • Take screen shots
Advice victims to keep a log to show pattern of stalking
5 Email Tracing Read from the Bottom Up
The complete email header is a record of: Start at the bottom of the email header and read Who sent the email up until you find the first IP address
Which network it originated from Received: from [12.10.116.2] by Which email servers processed it web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT Miscellaneous information: X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Timestamps Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) Email client From: Creepy Stalker
Some of it is useful for tracing email, some of it is not
Reading the Header Find the ISP
After noting the IP address of the sender you must IP addresses are assigned to providers note the date and time stamp of the email Use search engines to find the owner of the address Received: from [12.10.116.2] by www.samspade.org web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT www.dnsstuff.com X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 www.arin.net Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) www.geektools.com From: Creepy Stalker
Email – Documentation Social Networking Sites
Save emails - electronic and hard copies with expanded headers
Received: from [12.10.116.2] by web113110.mail.gq1.yahoo.com via HTTP; Thu, 27 Sep 2013 12:13:42 PDT X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Date: Thu, 27 Sep 2013 12:13:42 -0700 (PDT) From: Creepy Stalker
Do not have victims forward emails – will alter IP address
6 How are Online Spaces Misused? Social Media + Phones + Location
• Creating Fake Accounts: • Sextorition/extorition • get “around” blocking. • Harassment through • Impersonation: email, instant messaging, • Taking over accounts, or social networking Need to check settings for pretending to be victim. sites. all social media accounts on • Stalking: • Sending numerous each device used. • Gathering information and/or hateful, through search engines and public profiles. threatening messages.
• Posting pictures/videos • Posting negative, online – revenge porn, harmful, or false recording assaults information
SNS - Documentation Considerations for Responders
Capture and save screenshots (PrntScrn) Documentation
Some sites offer a “download your information” • Preserve emails electronically and service in account settings hard copy with expanded header • Do not forward emails • Screen shot social networking posts
Victim Safety • Explore online presence, account security, privacy settings • Discuss freedom/safety balance • What is on other people’s pages
Laptop & Web Cams
Cameras
7 Software How can they be disguised?
Tincam.com (Windows)
Evological.com (EvoCam) (Mac)
Periscope (Mac)
Run in background Take images and video secretly
How Cameras are Used Camera Considerations
Keep track of victims – learning their routine, monitoring behaviors, etc. Equipment is inexpensive and easy to access Watch victim without being seen – be omnipresent
Obtain information they otherwise wouldn’t be able to have Look for cameras or common objects in which cameras may be hidden
Manipulate victim; blackmail Camera detection Scare and harass— “I’m watching and know what you are •Signal detectors doing” •Lens detectors
Turning the Camera
Why use video surveillance? Computers & Tablets Excellent evidence
Always active
Cheaper than physical surveillance
Provides victims with sense of security
8 Computer Spyware Keystroke Logging Hardware
See everything the victim Can be keyboard ports, special keyboards, or mouse does on the computer No software to install or configure - just plug it in Control the functioning of the Need physical access to install & remove computer Power Camera Sound
Can be installed remotely or by physical accessing the computer
Spyware – Victim Safety Online Victim Safety
Educate victims about remote access/spyware possibilities Educate victims about availability of info
Encourage victims to use a “safer” computer Not connected to the Internet Encourage victims to routinely search for Shared computers at the library or elsewhere themselves
Spyware “cleaners” do not guarantee safety Discuss options for having information Removal of spyware may escalate offender’s removed behavior • Safe Shepherd: www.safeshepherd.com/advocates • Reputation.com: www.reputation.com/domesticviolence
Use of Technology to Stalk © National Center for Victims of Crime 2015 Content of this presentation may be reproduced for educational www.victimsofcrime.org/src purposes with the permission of the Stalking Resource Center. Please contact the Stalking Resource Center at [email protected] or 202-467- 8700 for permission.
This project was supported by Grant No. 2014-TA-AX-K056 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women.
9