Use of Tech Tampa

Total Page:16

File Type:pdf, Size:1020Kb

Use of Tech Tampa Use of Technology to Stalk Phones – calls, messages, texts, pics, video Use of Technology to Stalk Cameras Global Positioning Systems (GPS) Computers Social networking sites Email & IM Spyware Sue Ryan, Program Attorney Assistive technologies www.victimsofcrime.org/src Technology is not the enemy Cell Phones How can phones be manipulated by stalkers? Criminals exploit the technology to create an advantage for themselves Calls, texts, photos, video Cell phone settings can be manipulated to act as Most of the technologies used by stalkers have listening device legitimate and legal functions Access to victim We must keep up with the criminals and Hidden device ensure our laws and policies reflect the reality of stalking GPS tracking Tracking via Cell Phones Tracking via Cell Phones Stalkers may (mis)use legitimate phone services and features to track and stalk Stalkers may also use applications and install them on to a victim’s phone to track and stalk 1 Other Family Locator Apps Location Based Services Search for: Locate Find kids, find friends Track spouse GPS Tracking Lite Family Tracker Exif: Exchangeable image file Geotagging Exif Viewers format: Descriptive data (meta- data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation. Camera GPS Geotagging 2 Disabling Geotagging Listen to Calls Locate Search “how to disable geotagging on a [phone make/model]” www.icanstalku.com Cell Phone Spyware Read text Activate messages Speaker Detecting Cell Phone Spyware Call & Text Spoofing Offender knows Gives caller ability to change number shown on caller ID or text, things that they could Battery overuse change sound of voice and to record calls only know if they and/or have access to the high data usage phone Offender has or had Clicks or sounds physical access when on calls Spoofing Text Message Spoofing Most Send text messages sites/apps anonymously offer 1 free Telespoof.com spoofed call Phonegangster.com Spoofcard.com Spooftel.com 3 Disappearing SMS & MMS Considerations for Responders Wickr , Snapchat & Facebook Slingshot: Documentation SMS & MMS • Preserve audio, SMS (text), MMS Both users need to have the app (photo, video) on the phone and separate from phone • Victims can get detailed copies of their own cellphone bills Victim Safety • Educate victims about GPS tracking, spoofing, spyware, etc. • Option for victims to get new cellphone, but maintain current cellphone Cellphones – Victim Safety Regularly ask victims about their cell phone use Global Positioning Systems Discuss spyware potential (GPS) & Locating Devices Discuss account privacy If offender has ever had access to phone: Consider completely wiping phone & restoring to factory settings (discuss potential safety risks of this action) Consider keeping phone but not using it for anything that could reveal location of victim but also using a different, safer phone (no-contract phones, donated phones) Global Positioning Systems: GPS GPS Documentation & Evidence 1. Locate device on the victim’s car 2. Tie suspect to the device Active and Variety of passive power GPS sources Small, easily hidden Map, satellite, bird’s eye views 4 GPS Documentation & Evidence Email How do stalkers use email? Financial Computer Phone Data Send email • Tracking • Apps • Equipment Monitor email software • Websites purchase • Tracking • Call-in • Real time Intercept email websites numbers tracking • Texts service charge Impersonate victim and send messages to others Email Anonymizers Disappearing Emails Sites/services that will mask the senders Send a message that “disappears” after a identity certain time period or when the viewer deletes it Email address IP address Receiver clicks on a link to the private message Some prevent screenshots or copy/paste function Disappearing Emails - Documentation Email Tracing Most self-destruct emails create a In order to determine the sender of an email, an link to send investigator needs the email’s header information. • Follow the regular steps in tracking email An email header is the information added to the beginning/top of the electronic message. Most of the “emails” are actually By default, email clients and services only show an a message on a web browser abbreviated form of the header. • Take screen shots Advice victims to keep a log to show pattern of stalking 5 Email Tracing Read from the Bottom Up The complete email header is a record of: Start at the bottom of the email header and read Who sent the email up until you find the first IP address Which network it originated from Received: from [12.10.116.2] by Which email servers processed it web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT Miscellaneous information: X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Timestamps Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) Email client From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? Encoding information, etc. To: [email protected] Some of it is useful for tracing email, some of it is not Reading the Header Find the ISP After noting the IP address of the sender you must IP addresses are assigned to providers note the date and time stamp of the email Use search engines to find the owner of the address Received: from [12.10.116.2] by www.samspade.org web113110.mail.gq1.yahoo.com via HTTP; Thu, 24 Sep 2013 12:13:42 PDT www.dnsstuff.com X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 www.arin.net Date: Thu, 24 Sep 2013 12:13:42 -0700 (PDT) www.geektools.com From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? Go to one of these sites and choose the “who To: [email protected] is” function or similar search Email – Documentation Social Networking Sites Save emails - electronic and hard copies with expanded headers Received: from [12.10.116.2] by web113110.mail.gq1.yahoo.com via HTTP; Thu, 27 Sep 2013 12:13:42 PDT X-Mailer: YahooMailRC/157.18 YahooMailWebService/0.7.347.2 Date: Thu, 27 Sep 2013 12:13:42 -0700 (PDT) From: Creepy Stalker <[email protected]> Subject: do you think i am kidding? To: [email protected] Do not have victims forward emails – will alter IP address 6 How are Online Spaces Misused? Social Media + Phones + Location • Creating Fake Accounts: • Sextorition/extorition • get “around” blocking. • Harassment through • Impersonation: email, instant messaging, • Taking over accounts, or social networking Need to check settings for pretending to be victim. sites. all social media accounts on • Stalking: • Sending numerous each device used. • Gathering information and/or hateful, through search engines and public profiles. threatening messages. • Posting pictures/videos • Posting negative, online – revenge porn, harmful, or false recording assaults information SNS - Documentation Considerations for Responders Capture and save screenshots (PrntScrn) Documentation Some sites offer a “download your information” • Preserve emails electronically and service in account settings hard copy with expanded header • Do not forward emails • Screen shot social networking posts Victim Safety • Explore online presence, account security, privacy settings • Discuss freedom/safety balance • What is on other people’s pages Laptop & Web Cams Cameras 7 Software How can they be disguised? Tincam.com (Windows) Evological.com (EvoCam) (Mac) Periscope (Mac) Run in background Take images and video secretly How Cameras are Used Camera Considerations Keep track of victims – learning their routine, monitoring behaviors, etc. Equipment is inexpensive and easy to access Watch victim without being seen – be omnipresent Obtain information they otherwise wouldn’t be able to have Look for cameras or common objects in which cameras may be hidden Manipulate victim; blackmail Camera detection Scare and harass— “I’m watching and know what you are •Signal detectors doing” •Lens detectors Turning the Camera Why use video surveillance? Computers & Tablets Excellent evidence Always active Cheaper than physical surveillance Provides victims with sense of security 8 Computer Spyware Keystroke Logging Hardware See everything the victim Can be keyboard ports, special keyboards, or mouse does on the computer No software to install or configure - just plug it in Control the functioning of the Need physical access to install & remove computer Power Camera Sound Can be installed remotely or by physical accessing the computer Spyware – Victim Safety Online Victim Safety Educate victims about remote access/spyware possibilities Educate victims about availability of info Encourage victims to use a “safer” computer Not connected to the Internet Encourage victims to routinely search for Shared computers at the library or elsewhere themselves Spyware “cleaners” do not guarantee safety Discuss options for having information Removal of spyware may escalate offender’s removed behavior • Safe Shepherd: www.safeshepherd.com/advocates • Reputation.com: www.reputation.com/domesticviolence Use of Technology to Stalk © National Center for Victims of Crime 2015 Content of this presentation may be reproduced for educational www.victimsofcrime.org/src purposes with the permission of the Stalking Resource Center. Please contact the Stalking Resource Center at [email protected] or 202-467- 8700 for permission. This project was supported by Grant No. 2014-TA-AX-K056 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. 9 .
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Safety Activity Checkpoints (SAC)
    1 GSUSA 2021 Edition Safety Activity Checkpoints Change Memo – Important Updates to 2021 Edition The 2021 Edition of GSUSA’s Safety Activity Checkpoints has been updated to reflect the following changes as outlined in this three-page memo. National guidelines are developed in collaboration with the Girl Scout Council Safety Activity Checkpoints Task Team which includes a balanced regional representation as well as in-depth expertise and experience in the areas of Girl Scout programs, safety, and risk management. Standard Safety Guidelines. GSUSA’s Standard Safety Guidelines (formerly titled “Girl Scout Activity Safety Standards & Guidelines”) are located on pages 4 - 22 and apply to all Girl Scout activities including: troop meetings, day trips, special events, camp, travel, and product program. Accordingly, a link under each activity chapter has been added to direct volunteers to the Standard Safety Guidelines section. Within the Standard Safety Guidelines (p. 4 - 22) are the following updates: Adult Supervision. Further emphasizes the long-standing Girl Scout rule of at least two registered and approved, unrelated Girl Scout volunteers, one of whom is female. Examples of unrelated are provided as: not a sibling, spouse, domestic partner, parent, child, or anyone who would be considered a family member, and who do not live in the same residence. This rule applies to all Girl Scout gatherings and is mandatory whenever girls meet, whether in person or virtually. It is recommended that councils advise troops and parents of this requirement so that the council can be alerted if the supervision is not meeting this requirement. Activities not Listed in Safety Activity Checkpoints.
    [Show full text]
  • Being an Advocate for Substance Abuse Treatment and Prevention
    Being an Advocate for Substance Abuse Treatment and Prevenon—Time for New Strategies Andrew Kessler Slingshot Solutions, LLC NCAD 2013 Anaheim, CA September 21, 2013 FOUNDED AND PRODUCED BY THE PUBLISHERS OF IN CONJUNCTION WITH IN ASSOCIATION WITH Introductions all around! • Andrew Kessler, J.D. • Slingshot Solu6ons, LLC • Incorporated in 2008 • Clients include IC&RC, CAADAC/ CFAAP, Strategic Applicaons Internaonal, Naonal Council on Problem Gambling Who am I? Why am I here? • To learn about the environment we are currently in • To learn about how substance abuse is viewed by policy makers • To take what we learn and apply it to effec6ve advocacy strategies • (All in 60 minutes!) What is an expert? • Webster’s: “having, involving, or displaying special skill or knowledge derived from training or experience.” • Court of law: “a person who is a specialist in a subject, oZen technical, who may present his/ her expert opinion” • Newsflash- I’m not the only expert in this room… We need you to be leaders • If the experts do not lead, who will? (That’s a rhetorical ques6on…) • This is a complex issue that will require guidance and paence. If you’re looking for overnight results, you can leave now. • I mean it. • Get ready to go outside your comfort zone • This is not about a step by step, easy to use formula. Developing that will take months if not years. We only have an hour. • This is about learning what is going on outside our world of treatment and preven6on, what is going on in the rest of the world of advocacy, and learning to operate in that world • This is about the landscape we are working in, and why our strategies need to change.
    [Show full text]
  • 2020 Safety Activity Checkpoints 2021 Edition @ April 1, 2021
    - 2020 SAFETY ACTIVITY CHECKPOINTS 2021 EDITION @ APRIL 1, 2021 1 Table of Contents Introduction .................................................................................................................................................. 4 Standard Safety Guidelines .......................................................................................................................... 4 Coronavirus Safety in Girl Scouts ................................................................................................................. 7 Have an Emergency Action Plan (EAP)......................................................................................................... 8 Understanding Which Activities Are Not Permitted ....................................................................................... 12 Chartered Aircraft Trips and Aviation........................................................................................................... 14 Other Actions Girls and Volunteers Should Not Take ................................................................................... 14 First Aid ..................................................................................................................................................... 14 Overall Health, Well Being and Inclusivity.................................................................................................... 17 Transporting Girls .....................................................................................................................................
    [Show full text]
  • AURI JAYA Ð CEO JPNN.Com 2 MEDIA FLOWCHART
    1 WEBINAR Regulasi Negara Dalam Menjaga Keberlangsungan Media Mainstream Di Era Disrupsi Medsos Kamis, 04 Februari 2021 AURI JAYA – CEO JPNN.com 2 MEDIA FLOWCHART Alur operasional bisnis media SHARE & CONTENT DISTRIBUTION Penyebaran dan distribusi konten ke Media memproduksi konten berbagai platform yang banyak artikel, audio atau video digunakan pembaca AUDIENCE TRAFFIC SOURCE MONETIZE Media mendapatkan pengunjung/pembaca Memperoleh pendapatan dari hasil yang berasal dari berbagai sumber penjualan konten atau iklan 3 TRAFFIC SOURCE Kategori sumber pengunjung yang mendistribusikan konten Search Pengunjung yang berasal dari search engine Social Pengunjung yang berasal dari media sosial Refferal Pengunjung yang berasal dari referensi website lain / agregator Direct Pengunjung yang langsung membuka halaman website TRAFFIC SOURCE LIST 4 Daftar sumber pengunjung berdarkan jenis platformnya Search Social Referral Pengunjung yang berasal dari search Pengunjung yang berasal dari media Pengunjung yang berasal dari engine sosial referensi website lain / agregator Ø Google Ø Facebook Ø Google News Ø Microsoft Bing Ø Twitter Ø BaBe Ø Yahoo Ø Instagram Ø Line Today Ø Baidu Ø Youtube Ø UC News Ø Yandex Ø WhatsApp Ø Flipboard Ø DuckDuckGo Ø Telegram Ø MSN Ø Ask.com Ø TikTok Ø Zend Yandex Ø Aol.com Ø Pinterest Ø Opera Ø … Dll Ø … Dll Ø … Dll 5 MONETIZE Sumber penghasilan media saat ini TRADISIONAL PROGRAMMATIC ADS VS ADS 6 TRADITIONAL VS PROGRAMMATIC Proses negosiasi pemasangan iklan model tradisional cukup Programmatic ad menjalankan suatu algoritma untuk memakan waktu dan biaya. Advertiser dan publisher harus mengumpulkan dan mengevaluasi data sehingga dapat bertemu untuk bernegosiasi harga iklan yang akan dipasang menentukan siapa dan dimana iklan akan ditampilkan Penetapan harga didapatkan dari hasil dinegosiasikan langsung Programmatic menggunakan proses yang dinamakan real-time antara advertiser dan publisher.
    [Show full text]
  • Facebook Fake News in the Post -Truth World
    9-717-473 REV: SEPTEMBER 14, 2 0 1 7 JOHN R. WELLS CAROLE A. WINKLER Facebook Fake News in the Post -Truth World Our mission is to make the world more open and connected. — Mark Zuckerberg1 Introduction In January 2017, Mark Zuckerberg, founder and CEO of Facebook was surrounded by controversy. The election of Donald Trump as the next President of the United States on November 8, 2016 had triggered a national storm of protests, and many put the blame at the door of fake news stories served up on Facebook’s Trending News Feed.2 Facebook had launched the service in January 2014 to deliver news stories that might be of interest to Facebook users, in addition to the automatic News Feed that told them what was going on in their social network. Individuals could select items that they were interested in, but an algorithm served up news items that might appeal based on past reading habits and those of their close friends.3 The argument against Facebook was that this process polarized public opinion, fueled prejudices and encouraged the bitter partisan character of the election campaign.4 Some claimed that fake news, propagated through News Feed, supported the rise of anti-establishment sentiments amongst groups that felt left behind by the establishment elite.5 Zuckerberg was unapologetic. On November 10, 2016 he had commented, “Personally I think the idea that fake news on Facebook, which is a very small amount of the content, influenced the election in any way — I think is a pretty crazy idea.”6 He argued that fake stories were posted on both sides of the political spectrum.
    [Show full text]
  • Summaries and Best Practices
    Dartmouth College FY 16 Club and Group Activities Report (CGAR) Summaries and Best Practices Alumni Relations – Communities [email protected] (603) 646-3497 1. Introduction This is the second year that the Communities Department has provided our club and group volunteers with access to the great ideas, successes, and best practices of over 80 Dartmouth alumni clubs and groups. This information on a range of topics is gleaned from the FY16 CGAR: How to involve more alumni in your organization. Successful initiatives of other clubs and groups. The most unusual or innovative events of other clubs and groups. Ideas for admitted student events, summer send offs, and more. How to have effective communications: email, website, newsletter, etc. Methods to encourage members to pay dues. And 18 other topics! 2. How to Use this Resource The CGAR contains numerous open ended questions that our volunteer leaders answer every year. For 24 of these questions, this resource provides both big picture and detailed information: Overview of 24 topics (page 3) Executive summaries of each question (pages 5 – 12) Detailed responses provided by volunteers for each question (pages 13 – 81) This resource is extensively hyper-linked to make it easy to quickly move from the executive summaries to over 1,600 detailed responses (and vice versa). Each detailed response identifies the club or group that provided the suggestion. To contact a leader from a particular club or group, first visit the AR website where contact information for all clubs and groups is listed. If you cannot find a contact, please contact our office.
    [Show full text]
  • Facebook's Slingshot for Fleeting Posts 17 June 2014, by Barbara Ortutay
    App Watch: Facebook's Slingshot for fleeting posts 17 June 2014, by Barbara Ortutay accidentally released it last week in Apple's app store, giving some vigilant Facebook watchers an early glimpse before the app was removed from the store. Slingshot works with both Apple and Android devices. A Facebook account isn't required. — HOW IT WORKS: After downloading, you can sign up either with a Facebook account or your mobile phone number. You add contacts based on your Facebook friends and phone contacts. Opening the app takes you to its camera, which has a "shoot" button for taking a snapshot and a "selfie" button for, you guessed it, a selfie. After taking a photo, you can type a message of up to This combo made from images provided by Facebook 140 characters on it, or draw a picture. You can shows the company's Slingshot app. After accidentally then send it to some or all of your Slingshot launching the ephemeral messaging app last week, contacts. Facebook says Slingshot is now ready for prime time, and owners of Android or Apple's iOS devices can — UNLIKE SNAPCHAT: download it starting on Tuesday afternoon, June 17, 2014. (AP Photo/Facebook) On Snapchat, people can see a photo sent to them by tapping on it and holding their finger down until it disappears, always within a few seconds. On Slingshot, you can see a message only if you send Facebook is taking another stab at ephemeral one back. Until you do, you'll only see a pixelated mobile messaging with an app called Slingshot.
    [Show full text]
  • Una Propuesta Metodológica Para Estudiar El Impacto De Los Sitios De Nueva Generación En El Periodismo
    Universidad CEU Cardenal Herrera Departamento de Comunicación e Información Periodística Una propuesta metodológica para estudiar el impacto de los sitios de nueva generación en el periodismo TESIS DOCTORAL Presentada por: Helena Albacar Serrano Dirigida por: Dra. Elvira García de Torres Dr. Pablo González-Pola de la Granja Valencia 2017 2 Índice Introducción ........................................................................................................................7 Capítulo 1. Marco Teórico .................................................................................................. 15 1.1. El nuevo entorno comunicativo y su impacto en el periodismo ...................................... 15 1.1.1. Aparición y desarrollo de Internet ...................................................................... 17 1.1.2. La descentralización comunicativa y sus consecuencias .................................... 26 1.1.3. La ruptura del monopolio mediático .................................................................. 35 1.1.4. Contenidos generados por el usuario y su influencia en el periodismo ............. 40 1.2. La primera etapa de los sitios de nueva generación ........................................................ 44 1.2.1. Los portales ......................................................................................................... 44 1.2.2. Los buscadores .................................................................................................... 51 1.2.3. Las redes sociales ...............................................................................................
    [Show full text]
  • Intertwined Development of Business Model and Product Functions for Mobile Applications: a Twin Peak Feature Modeling Approach
    Intertwined Development of Business Model and Product Functions for Mobile Applications: A Twin Peak Feature Modeling Approach? - Technical Report - Sebastian Gottschalk, Florian Rittmeier, and Gregor Engels Software Innovation Lab, Paderborn University, Paderborn, Germany fsebastian.gottschalk,florianr,[email protected] Abstract. Mobile app stores like Apple's AppStore or Google's Play- Store are highly competitive markets for third-party developers want- ing to develop successful applications. During the development process, many developers focus on the multitude of product functions but neglect the business model as an equally important part. This, in turn, raises the question of how we intertwine the business model and product functions during the development process to ensure a better alignment between the two. In our paper, we show this intertwined development by adapt- ing the concept of Twin Peaks to the business model and product func- tions. Based on feature modeling as an abstraction layer, we introduce the concept of a Business Model Decision Line (BMDL) to structure the business model decisions and their relation to product functions struc- tured in a Software Product Line (SPL). The basis of our feature models is the analysis of top listed applications in the app stores of Apple and Google. To create and modify both models, we provide an incremental feature structuring and iterative feature selection process. In this technical report, we show the intermediate domain engineering steps of our BMDL and SPL together with detailed decision options. Moreover, we explain the building blocks of the BMDL which are miss- ing in our research paper and show their validity based on streaming applications.
    [Show full text]
  • Valens Research White Papers – the Impact of Capitalizing R&D
    Valens Research White Papers – The Impact of Capitalizing R&D | September 8, 2016 Valens Research R&D Is an Investment, Not an Expense – How capitalizing R&D impacts 917 284 6008 understanding corporate profitability (GILD, FB, BA, DHR) In several recent Seeking Alpha articles Valens has posted, questions about R&D Rob Spivey capitalization and R&D investment have come up in the comments section. As such, Managing Director we felt it was worth writing a post about this issue, the theoretical underpinnings 917 284 6008 behind it, and how this impacts companies. Angelica Lim In this article, we highlight the impact of these adjustments for companies such as Research Director Facebook (FB), Gilead Sciences (GILD), Boeing (BA), and Danaher (DHR). Throughout 646 453 7861 the article we provide links so that you can see more about how the companies look Kyle Pinkerton after we adjust the financial statements. To be able to see how company analysis Analyst looks when you make this and other key adjustments to clean up the financial 917 284 6008 statements, and get a better picture of corporate profitability and valuations, click here. To read more about our adjustments, click here, and to understand how we think about analyzing companies, click here. [email protected] The Problem – Should R&D be treated as an expense or an investment? The problem with Generally Accepted Accounting Principles (GAAP) is that they create inconsistencies when comparing one company to another, and can distort a company ’s true historical profitability. By making adjustments, we aim to remove the Valens Research App financial statement distortions and miscategorizations of GAAP.
    [Show full text]
  • Preliminary Evidence of Brand Acquaintancing on Snapchat
    Marketing Intelligence & Planning Preliminary evidence of brand acquaintancing on Snapchat Hemant Sashittal, Avan Jassawalla, Article information: To cite this document: Hemant Sashittal, Avan Jassawalla, (2019) "Preliminary evidence of brand acquaintancing on Snapchat", Marketing Intelligence & Planning, Vol. 37 Issue: 2, pp.197-210, https://doi.org/10.1108/ MIP-05-2018-0144 Permanent link to this document: https://doi.org/10.1108/MIP-05-2018-0144 Downloaded on: 02 April 2019, At: 06:21 (PT) References: this document contains references to 64 other documents. To copy this document: [email protected] The fulltext of this document has been downloaded 44 times since 2019* Users who downloaded this article also downloaded: (2019),"An emoji-based metric for monitoring consumers’ emotions toward brands on social media", Marketing Intelligence &amp; Planning, Vol. 37 Iss 2 pp. 211-225 <a href="https://doi.org/10.1108/ MIP-07-2018-0257">https://doi.org/10.1108/MIP-07-2018-0257</a> (2019),"The impact of corporate social responsibility on brand equity", Marketing Intelligence &amp; Planning, Vol. 37 Iss 1 pp. 2-17 <a href="https://doi.org/10.1108/MIP-02-2018-0051">https:// doi.org/10.1108/MIP-02-2018-0051</a> Access to this document was granted through an Emerald subscription provided by Token:Eprints:WWZ8Nfvxc2VxU7tUHPza: For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission Downloaded by Doctor Hemant Sashittal At 06:21 02 April 2019 (PT) guidelines are available for all.
    [Show full text]