Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they...
Transcript of Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they...
Emerging Uses of Cutting Edge Technologies
Priscilla GranthamSr. Research Counsel
National Center for Justice and the Rule of Law
Copyright © 2011 National Center for Justice and the Rule of Law 1
WEBINAR TIPS:1. To reduce background noise, please:
• Power off cell phones• Turn down (or mute) computer speakers if accessing webcast through telephone
2. The presenter is utilizing VoIP (Voice Over Internet Protocol) technology to deliver the audio portion of the webinar. In the event the audio malfunctions, please stand by; the presenter will quickly re‐join the webinar via telephone and continue the presentation.
3. Attendees will be muted during webinar in an effort to reduce background noise.
4. If you want to ask a question, type it in the chat box in the control pane on the right side of your screen, and then click the “send” button.
5. Questions are typically addressed at the end of the presentation.6. Please include your email and phone number with question. If presenter
does not have time to answer your question during the webcast, he/she will contact you following the webcast.
Type Question in this BoxWEBINAR
3
Topics:
• Cloud computing• Web‐based Apps• Cell phone spy‐ware• Computer monitoring software• Low‐tech and high tech methods to avoid detection, and
• private peer-to-peer networks• IP cameras
4
Cloud Computing• Workload shift• Hardware & software demands on user’s side decreased
• Users do not download and install programs on their own device
• User’s computer runs cloud computing system’s interface software – i.e., a web browser
• Applications provided & managed by cloud server; Data stored remotely by cloud server
5
Cloud Computing
cloud computing6
Word processing on user’s system…
Create document
Access document
7
Web-based document creation:
New document
8
Accessing Web-based document:
9
Web-based photo storage
10
Dropbox• Web based• File synchronization
• Computers• Phones• Dropbox website
• File backup• File sharing
• public• private
11
drop box vid
12
Computer Program v. Web Apps:
Programs
Outlook, Eudora
PowerPoint
Microsoft Word,
WordPerfect
Web Apps
Gmail, Hotmail
Prezi, Google Presentations
Google Docs
13
… Chromebooks• “New model of computing”• Apps, documents and settings are stored in the cloud• Designed to defend against threat of malware and viruses
• runs millions of web apps – games, spreadsheets, photo editors
• Boots in less than 10 seconds• Automatically updates itself• Built in wi‐fi and 3G• Webcam• No one using your chromebook will have access to your data
But this could never take off….
chromebook
14
Opas iPad 15
Cell phone spyware:
• Listen in to an active phone call (Call interception)• Secretly read texts, call logs, emails, cell IDs• Listen to phone’s surroundings• Secret GPS tracking• 100% undetectable in operation
Is your son buying drugs?Is your daughter still talking to that no good deadbeat?Is your employee stealing company information?
16
Cell phone spyware:
cell phone spyware video
Protect your children:•Remote, unobtrusive monitoring•Texting & driving prevention•Sexting prevention•Cyberbully prevention•Cell tracking
17
SpyBubble, FlexiSpy
18
Spyware
• Call tracking• Read and text msg sent or received, even if phone holder erases msg
• GPS location tracking – track exact position of phone using Google maps
• Phone book access – see every # stored in phone’s memory
• Email tracking – logs each incoming and outgoing email
• URL tracking – see which web sites user has visited
• Photo tracking – uploads all photos sent and received on the phone to a web server for your viewing.spybubble 19
How do they get away with it…
20
Malware is installed on computers and then collects information about users without their knowledge.
Malware on Computers
21
22
• Spyware collects personal information, such as Internet surfing habits& sites visited.
• Can Interfere with user control of computer installing additional software, redirecting Web Browser activity.
• Can change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
23
• Spyware , also referred to as Computer Monitoring Software, is commercially available on internet ‐ relatively inexpensive, usually less than $100.00.
• It is important to keep your Anti Virus definitions up to date.
• Even then, it is not always detected.
24
25
• Keystrokes Typed: Log all keystrokes typed by the user.
• Email Forwarding: Have all emails that a user sends and receives forwarded to your own private email account for later viewing.
• Desktop Screenshots: Log screenshots of the active window the remote user is working in and interacting with.
• Websites Visited: Log all websites visited by the user.
• Internet Connections: Log all internet connections made and attempted by the user.
• Windows Opened: Log all windows opened and used by the user.
• Chat Conversations: Log both sides of all ICQ,
MSN, Yahoo!, AOL, AIM messenger conversations! 26
Common Functions – Computer Spyware:
• Logs all applications and programs run
• Logs all print jobs
• Logs all files and folders created and deleted
• E‐mails typed
• Passwords typed
• Logs all documents viewed
• Records and monitors system information on the remote machine: uptime, memory, ram, and more.
• You can also remotely shutdown, reboot, restart, logoff, or freeze the remote PC as well!
• System Shutdowns and User changes27
Hide files or Folders
• Low‐tech• Renaming• Making invisible• Hiding from other users of computer
• High tech• Steganography• Encryption
28
Hiding Files or Foldershiding files and folders vid
• Change folder icons• Change extensions when saving
My illegal photos MS‐Dos Batch file icon
29
Steganography
• Concealing data within data
• Steganography lets users insert and extract hidden data into and from carrier files.
• Over 800 digital steganography applications
30
Steganography
• original image: 200 x 200 pixels, file size 88kb
• Remove all but the 2 least significant bits of each color component
• Recovered image• 200x200 pixels, file size 19kb
31
Keepin’ it on the Down Low….Maintaining privacy on line
• Anonymizers• Proxy servers• Private online file sharing
32
Anonymous surfingstrips your p.i.i.
• Block organization’s URL filter that blocks certain sites
• Allows one to surf through anonymous proxy
• Some services, i.e. Tor, require user to install application on the computer, others, i.e. Roxprox, do not.
33
anonymizer.com “Your IP address is your ID.”
• Anonymous surfing• Protected Wi‐Fi• Encrypted VPNvirtual Private network
• Untraceable IP rotation• Internet activities—Web browsing‚ email‚ chat‚ webcam are kept private and anonymous. Single point anonymizer
34
Proxy Servers:• Server is an intermediary to client seeking info from another server.
• Bypass work, parental controls
• Proxiify.com, Youhide.com
35
Change my IP address• www.whatismyipaddress.com• Unique number assigned to each computer assigned to the
Internet• May be static or dynamic
change my IP 36
Private Online File SharingPrivate P2P Networks
• Network of trusted sources• Share files only with those you know and trust GigaTribe 2Peer QNext
37
“The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces.”
38
2Peer – Features:Feature 2PeerDesktop 2PeerWeb
Browse Friends' ContentKeyword search for filesDownload filesInvite Users to your Private InternetOrganize users into groupsChange your profile informationUpdate your preference settingsView AlbumsDownload foldersShare folders and filesShare albumsChatView transfer historyCreate Albums
✔✔✔✔✔✔✔✔✔✔✔✔✔✔
✔✔✔✔✔✔✔✔ 39
2Peer 40
GigaTribe - Features:
• All data transfers are encrypted• No limitation on quantity or file size• No wasting time uploading files:
Select folders to share Contents of selected folders instantly accessible
to friends Friends browse and download files they want
• Data remains under your control; not saved on another company’s equipment
• Includes personal chat and private blog41
IP and Hidden Cameras
Just a few years ago the “Pinhole” surveillance camera was the at the cutting edge of stealth and concealment.
They are small and easily hidden in just about anything.
42
Easy as 1, 2, 3…
43
Pinhole Camera
44
Pinhole Camera in a pack of Cigarettes
45
Many Digital cameras and Cell Phone Cameras today record Exif data and Geo tagging information that can be viewed with free readily available software from the internet.
Victims who post these images in a public forum on the internet are susceptible to revealing to stalkers dates/ times and even specific locations of where they have been.
46
• Man installed GPS in estranged wife’s car• State stalking statute contained language: “under surveillance.”
• Ct. ruled surveillance included electronic surveillance;
• Husband’s act constituted stalking.
State v. Sullivan, 53 P.3d 1181 (Colo. Ct. App. 2002)
47
• Man & estranged wife living in same home
• Husband installed tiny video camera in wall of her bedroom.
• Ct. held that use of this technology constituted stalking under state law.
H.E.S. v. J.C.S., 815 A.2d 405 (N.J. 2003)
48
• Can be hardwired & plugged into outlet for continuous and uninterrupted recording.
• Limited by the size of the storage device which was usually a VHS tape.
• Innovations saw advent of wireless transmissions to remote storage w/ battery powered cameras.
• Limited by distance radio signal could transmit signal to the storage device. (Usually not very far — limited by walls, buildings, other physical obstacles.
49
•Draw backs of older camera systems corrected w/ the blending of Pinhole surveillance cameras and the Internet.
• IP Cameras (Internet Protocol Cameras) allowed viewing of cameras in live time from anywhere in the WORLD that had Internet connection.
IP Cameras
chinavision50
Setting up your IP Camera:• High speed Internet service
• CCTV Camera or “Network Ready” camera
• A Video Server
• Either the Video Server or the "Network Ready" Camera will provide a unique computer "address" known as an I.P. Address.
• ANY Computer can search and FIND the IP address, and connect to it. Depending on how you've configured the network, that computer can be next to the camera, or a million miles away, it really doesn't matter.
51
Topics:
• Cloud computing• Web‐based Apps• Cell phone spy‐ware• Computer monitoring software• Low‐tech and high tech methods to avoid detection, and
• private peer-to-peer networks• IP cameras
52