If you can't read please download the document
Upload
gavril
View
51
Download
1
Tags:
Embed Size (px)
DESCRIPTION
DIGITAL STALKING. Patricia Kubistal & Nancietta Stocking. WHO IS WATCHING?. Mary Jane has no computer; hence no email. She has credit cards, store savings cards, library card, a transit card and a cell phone. SO WHO IS WATCHING HER?. - PowerPoint PPT Presentation
Citation preview
DIGITAL STALKING
DIGITAL STALKING
Patricia Kubistal&Nancietta Stocking
Mary Jane has no computer; hence no email.She has credit cards, store savings cards, library card, a transit card and a cell phoneWHO IS WATCHING?
The grocery stores know what she purchases, when she purchases it. They have personal information when she applied for the store savings card.SO WHO IS WATCHING HER?
Stores restock their shelves based on the UPC codes.Coupons are developed to encourage salesDirect mailings are sent to her.GROCERY STORE
When her cell phone is on, the phone company can track where she is through pings off cell towersPHONE COMPANY
ANTI-TERROR PROGRAMS
Cell companies collect data every time a mobile phone accesses a tower, whether or not a call is made. That leaves a time-coded trail of user movement accessible to law enforcement.CELL TOWERS
The gold standard of personal tracking devices smartphones have embedded GPS, are internet-connected, and can run software. They allow location and behavior to be tracked through your cellular provider, by the device manufacturer, and by the developers of the apps you install.SMARTPHONES
She is caught on film nearly 200 times dailyThere are 30 million CCTV cameras in AmericaAbout 200 Million US citizens have had their call records monitored since 9/11
MARY JANES DAY
Since 9/11 NSA has been collecting detailed call history and conversations from the nations three largest phone companies to build the largest data base in the worldDATA BASES
The IRS had 1.8 million cases of tax refund fraud in 2012. This includes direct deposits as well as hard checks
PAYS HER TAXES
Banks and credit card companies routinely sell your shopping data to marketers. Even the feds can sniff your purchases in real time via a warrantless hot watch request
CREDIT CARDS
Customer data is big businessfor target advertising, sales leads, and behavioral analysis. Some firms collect data directly from customers; others use data aggregators which amass bigger, richer databases from multiple sources. That information is sometimes hacked due to substandard security, and much of it is subject to subpoena by law enforcement.COMPANIES
Scan you face to tell your gender and age.Then the content of the bill board changes content to respond to the person viewing it. Promotion video by Intel showing how it works
DIGITAL BILLBOARDS
U. S. POST OFFICE LOGS ALL MAIL
Load antivirus software onto your smartphone and keep updated.Apple has free one at iTunes AVG Safe Browser.
SMARTPHONES
Download apps only from usually reliable sources such as Google Play or App store for Android on Amazon.comPROTECTING YOUR PHONE
SPEAKING OF APPs
Set a pass code on your smartphone.Consider tracking software for lost or stolen phoneKEEP YOUR PHONE SAFE
Mary Sue has a computer and uses the internet and has an email count. She is tracked by computer cookies
MARY SUE AND STALKING
Cookies are the nexus for most online snooping. PCs can be watched to monitor your browsing habits or taken over outright by spyware, enabling remote access to all of your personal files and control of the device itself.PERSONAL COMPUTERS
Retailers such as Amazon and Apples iTunes have made customer profiling part of their business strategy. Many stores use cookies, pixel tags, and Web beacons to track you to other sites as wellso the product you browsed at one site shows up as an ad at another site.ON LINE STORES
Through tracking devices, the browsers records your movement to sites and individuals and corporations receive those movementsPRIVACY ISSUES
TRACKING SITES
Searches and online email accounts provide rich sources of data for advertisers; weak password protection can also make personal online accounts prime targets for hackersONLINE SERVICES
GOOGLE MAPS
AquariusAquarius1Aquar$ius1Aqu57ar$iu3s9.08 minutes1.59 days19.24 years17,400,000 yearsPASSWORDS AND TIME TO CRACK
Data breaches persist despite security push in government agencies, companies, medical records, restaurants, stores, bank pin numbers, etc.
DATA BREACHES
Every move we make is subject to digital prying eyes, and once your data has been collected, there is no telling where it will end up
SURVEILLANCE STATE
GOVERNMENT MONITORS
Toy Drone locks on a face in the distance, then identifies it.Can take a masked face and focus only on eyebrows and search a catalog and identifyFACIAL IDENTIFICATION
UTZAVUtzav is a system that take your photo and the software maps a face using dots like electronic measles and creates something as unique as a finger print: a face print. Pins and passwords are giving way to face prints. Face recognition can be done without your knowledge.
In the past 12 years law enforcement agencies have been granted vast surveillance powers through changes in both the law and the technology available to them. Local, state and federal authorities routinely access records about customers from private industry as well.LAW ENFORCEMENT
Both the quantity and capability of surveillance cameras have increased dramatically in the past decade. Modern license plate readers can process 1800 plates per minute, and facial recognition systems such as the one used by the Pennsylvania Justice Network can automatically match faces from surveillance footage to mug shots in criminal databases.CAMERAS
Cameras monitor the outside of cars but many cars have internet-connected telematics systems on the inside that log location and driver behavior. Insurers now offer safe-driver discounts for drivers who enable tracking devices on their vehicles. VEHICLES
Access to Global Positioning System satellites is now routinely built into cars, smart phones and tablet computers, making it possible to locate any of these devices to within 25 feet.GPS DEVICES
All public Wi-Fi should be treated with cautionUpdate your laptop, tablet or smartphone security software immediately before staying at a hotel
HOTEL WI-FI
Never use hotel WI-FI for on line banking, credit card account management or investment managementDo not use hotel lobby computers for these things eithersHotel WI-FI (Continued)
Check with hotel to confirm you are logging into the authentic hotel WI-FI. Key loggers are often loaded onto public computersHOTEL WI-FI (Continued)