Use of Technology to Stalk

 Phones – calls, , texts, pics, video Use of Technology to Stalk  Cameras  Global Positioning Systems (GPS)

 Computers

 Social networking sites

 Email & IM

 Spyware Sue Ryan, Program Attorney  Assistive technologies www.victimsofcrime.org/src

Technology is not the enemy Cell Phones

 How can phones be manipulated by stalkers?  Criminals exploit the technology to create an advantage for themselves  Calls, texts, photos, video  Cell phone settings can be manipulated to act as  Most of the technologies used by stalkers have listening device legitimate and legal functions  Access to victim  We must keep up with the criminals and  Hidden device ensure our laws and policies reflect the reality of stalking  GPS tracking

Tracking via Cell Phones Tracking via Cell Phones

 Stalkers may (mis)use legitimate phone services and features to track and stalk

 Stalkers may also use applications and install them on to a victim’s phone to track and stalk

1 Other Family Locator Apps Location Based Services

Search for:

 Locate

 Find kids, find friends

 Track spouse

GPS Tracking Lite

Family Tracker

Exif: Exchangeable image file Geotagging Exif Viewers format: Descriptive data (meta- data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation.

Camera GPS Geotagging

2 Disabling Geotagging Listen to Calls Locate  Search “how to disable geotagging on a [phone make/model]”

 www.icanstalku.com Cell Phone Spyware

Read text Activate messages Speaker

Detecting Cell Phone Spyware Call & Text Spoofing

Offender knows Gives caller ability to change number shown on caller ID or text, things that they could Battery overuse change sound of voice and to record calls only know if they and/or have access to the high data usage phone

Offender has or had Clicks or sounds physical access when on calls

Spoofing Text Message Spoofing

Most Send text messages

sites/apps anonymously

offer 1 free Telespoof.com spoofed call Phonegangster.com

Spoofcard.com Spooftel.com

3 Disappearing SMS & MMS Considerations for Responders

Wickr , & Slingshot: Documentation  SMS & MMS • Preserve audio, SMS (text), MMS  Both users need to have the app (photo, video) on the phone and separate from phone • Victims can get detailed copies of their own cellphone bills

Victim Safety • Educate victims about GPS tracking, spoofing, spyware, etc. • Option for victims to get new cellphone, but maintain current cellphone

Cellphones – Victim Safety

 Regularly ask victims about their cell phone use Global Positioning Systems  Discuss spyware potential (GPS) & Locating Devices  Discuss account privacy

 If offender has ever had access to phone:

 Consider completely wiping phone & restoring to factory settings (discuss potential safety risks of this action)

 Consider keeping phone but not using it for anything that could reveal location of victim but also using a different, safer phone (no-contract phones, donated phones)

Global Positioning Systems: GPS GPS Documentation & Evidence

1. Locate device on the victim’s car 2. Tie suspect to the device

Active and Variety of passive power GPS sources Small, easily hidden Map, satellite, bird’s eye views

4 GPS Documentation & Evidence Email

How do stalkers use email? Financial Computer Phone Data Send email

• Tracking • Apps • Equipment Monitor email software • Websites purchase • Tracking • Call-in • Real time Intercept email websites numbers tracking • Texts service charge Impersonate victim and send messages to others

Email Anonymizers Disappearing Emails

Sites/services that will mask the senders Send a message that “disappears” after a identity certain time period or when the viewer deletes it  Email address

 IP address Receiver clicks on a link to the private message

Some prevent screenshots or copy/paste function

Disappearing Emails - Documentation Email Tracing

Most self-destruct emails create a  In order to determine the sender of an email, an link to send investigator needs the email’s header information. • Follow the regular steps in tracking email  An email header is the information added to the beginning/top of the electronic message. Most of the “emails” are actually  By default, email clients and services only show an a message on a web browser abbreviated form of the header. • Take screen shots

Advice victims to keep a log to show pattern of stalking

5 Email Tracing Read from the Bottom Up

The complete email header is a record of: Start at the bottom of the email header and read  Who sent the email up until you find the first IP address

 Which network it originated from Received: from [12.10.116.2] by  Which email servers processed it web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT  Miscellaneous information: X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2  Timestamps Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT)  Email client From: Creepy Stalker Subject: do you think i am kidding?  Encoding information, etc. To: [email protected]

Some of it is useful for tracing email, some of it is not

Reading the Header Find the ISP

After noting the IP address of the sender you must  IP addresses are assigned to providers note the date and time stamp of the email  Use search engines to find the owner of the address Received: from [12.10.116.2] by  www.samspade.org web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT  www.dnsstuff.com X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2  www.arin.net Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT)  www.geektools.com From: Creepy Stalker Subject: do you think i am kidding? Go to one of these sites and choose the “who To: [email protected] is” function or similar search

Email – Documentation Social Networking Sites

 Save emails - electronic and hard copies with expanded headers

Received: from [12.10.116.2] by web113110.mail.gq1.yahoo.com via HTTP; Thu, 27 Sep 2013 12:13:42 PDT X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Date: Thu, 27 Sep 2013 12:13:42 -0700 (PDT) From: Creepy Stalker Subject: do you think i am kidding? To: [email protected]

 Do not have victims forward emails – will alter IP address

6 How are Online Spaces Misused? Social Media + Phones + Location

• Creating Fake Accounts: • Sextorition/extorition • get “around” blocking. • Harassment through • Impersonation: email, , • Taking over accounts, or social networking  Need to check settings for pretending to be victim. sites. all social media accounts on • Stalking: • Sending numerous each device used. • Gathering information and/or hateful, through search engines and public profiles. threatening messages.

• Posting pictures/videos • Posting negative, online – revenge porn, harmful, or false recording assaults information

SNS - Documentation Considerations for Responders

 Capture and save screenshots (PrntScrn) Documentation

 Some sites offer a “download your information” • Preserve emails electronically and service in account settings hard copy with expanded header • Do not forward emails • Screen shot social networking posts

Victim Safety • Explore online presence, account security, privacy settings • Discuss freedom/safety balance • What is on other people’s pages

Laptop & Web Cams

Cameras

7 Software How can they be disguised?

 Tincam.com (Windows)

 Evological.com (EvoCam) (Mac)

 Periscope (Mac)

 Run in background  Take images and video secretly

How Cameras are Used Camera Considerations

Keep track of victims – learning their routine, monitoring behaviors, etc. Equipment is inexpensive and easy to access Watch victim without being seen – be omnipresent

Obtain information they otherwise wouldn’t be able to have Look for cameras or common objects in which cameras may be hidden

Manipulate victim; blackmail Camera detection Scare and harass— “I’ watching and know what you are • detectors doing” •Lens detectors

Turning the Camera

Why use video surveillance? Computers & Tablets  Excellent evidence

 Always active

 Cheaper than physical surveillance

 Provides victims with sense of security

8 Computer Spyware Keystroke Logging Hardware

 See everything the victim  Can be keyboard ports, special keyboards, or mouse does on the computer  No software to install or configure - just plug it in  Control the functioning of the  Need physical access to install & remove computer  Power  Camera  Sound

 Can be installed remotely or by physical accessing the computer

Spyware – Victim Safety Online Victim Safety

 Educate victims about remote access/spyware possibilities Educate victims about availability of info

 Encourage victims to use a “safer” computer  Not connected to the Internet Encourage victims to routinely search for  Shared computers at the library or elsewhere themselves

 Spyware “cleaners” do not guarantee safety Discuss options for having information  Removal of spyware may escalate offender’s removed behavior • Safe Shepherd: www.safeshepherd.com/advocates • Reputation.com: www.reputation.com/domesticviolence

Use of Technology to Stalk © National Center for Victims of Crime 2015 Content of this presentation may be reproduced for educational www.victimsofcrime.org/src purposes with the permission of the Stalking Resource Center. Please contact the Stalking Resource Center at [email protected] or 202-467- 8700 for permission.

This project was supported by Grant No. 2014-TA-AX-K056 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women.

9