September 10, 2018 at 2-3:30pm CDT · 9/10/2018 · Cell Phone Spyware Cell Phone Spyware Spyware...
Transcript of September 10, 2018 at 2-3:30pm CDT · 9/10/2018 · Cell Phone Spyware Cell Phone Spyware Spyware...
1
Stalking 2.0
The Use of Technology to Stalk
Jennifer Landhuis, Stalking Prevention, Awareness,
and Resource Center (SPARC)
This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this (document/program/exhibit) are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women.
September 10, 2018 at 2-3:30pm CDT
Use of Technology to Stalk
In‐Person Training
Webinars
Online Resources
Individual & Organizational Assistance
Policy/Protocol Development & Consultation
National Stalking Awareness Month Materials
For Additional Resources*www.stalkingawareness.org (coming soon!)
* Training modules
* Victim resources
* Practitioner guides
*Webinars
*Follow us on TwitterSPARC @followuslegally
Fair Use
This presentation includes the creative work of others. This property is being used by permission or under claim of “fair use” (17 USC § 107). This presentation was created pursuant to fair use guidelines, and further use or distribution is prohibited.
Defining Stalking
Behavioral
Statutory
Stalking
A pattern of behavior directed at a specific person that would cause a reasonable person to feel fear
Behaviors Involving Technology
IPV Stalking and Technology*Stalker’s access to victim accounts
* Infer or compel disclosure of credentials
* Offender is owner of account
*Victims often report having “no idea” of what stalker may have done to their device
Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON
HUMAN‐COMPUTER INTERACTIONS (2017)
Professionals and Technology
*Shared social circles make it nearly impossible to block the stalker. Victims report trusting the “wrong person”
*A small percentage of professionals include discussion of risk factors related to technology
*Disconnecting is often not realistic or safe
Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON
HUMAN‐COMPUTER INTERACTIONS (2017)
Cell Phone Technologies
TrapCall (trapcall.com)
Call and Text Spoofing
Gives caller ability to change number shown on caller ID or text, change sound of voice and to record calls
Video clip
Spoof Phone Calls
Evidence with a SpoofCard
*Phone records from: victim, “friend”, and suspect
*Victim’s records show “friend” called
* Friend’s records show no call
* Suspect’s records show a call to SpoofCard* Call the number and record
* Financial records of suspect
Evidence with an App
* If you have access to suspect’s phone, screen shot of app downloaded
* If no access, can you access “store” to look for a history of the app being downloaded
* Financial records if the suspect paid for the app
*No person or entity in the United States shall, with the intent to defraud, cause harm, or wrongfully obtain anything of value, knowingly cause, directly or indirectly, any caller identification service to transmit or display misleading or inaccurate caller identification information
*FCC can levy up to $10,000 per violation
In 2016 the FCC filed a Notice of Apparent Liability against two individuals and proposed levying a fine of $25,000 each.
Truth in Caller ID Act, 2009
Filing a Complaint With FCC
* File a complaint online at https://consumercomplaints.fcc.gov
* By phone 1‐888‐CALL‐FCC (1‐888‐225‐5322); TTY: 1‐888‐TELL‐FCC (1‐888‐835‐5322); ASL: 1‐844‐432‐2275
* By mail (include your name, address, contact information and as much detail about your complaint as possible)Federal Communications Commission Consumer and Governmental Affairs Bureau Consumer Inquiries and Complaints Division 445 12th Street, S.W. Washington, DC 20554
Global Positioning Systems (GPS) and Locating Devices
GPS Devices
Geotagging
Camera GPS Geotagging
Exif Viewers Show Geo‐Info
Exif: Exchangeable image file format: Descriptive data (meta‐data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation
EXIF Data
EXIF Data
Sites that strip EXIF data before posting photos
• Facebook• Twitter• eBay• Instagram – unless pic was added to Photo Map
• Flickr – gives the option
Sites that DO NOT strip EXIF data before posting photos:
• Tumblr
• DropBox
Disabling Geo‐Data
Search “how to disable geotagging on a [phone
make/model]”
Cell Phone Spyware
Cell Phone Spyware
Spyware
*Overt Spyware (Like SpyGenie)
*Dual‐use apps: designed for a legitimate purpose but can be repurposed by a stalker (Find my iPhone)
*Most require physical access to the phone
*Many are covert
Detecting Cell Phone Spyware
Offender knows things that they could only know if they have access to the phone
Battery overuse and/or high data usage
Offender has or had physical access
Clicks or sounds when on calls
Cell Phone Safety
Documentation
Document communications
*Audio: on phone and separately
* Text:
*On phone
*Digital image of phone face
*StitchIt; Tailor Apps*Victims can get detailed copies of their own phone bills
Cameras
How Can Cameras Be Disguised?
Camera Considerations
Equipment is inexpensive and easy to access
Look for cameras or common objects in which cameras may be hidden
Camera detection
•Signal detectors
•Lens detectors
Computers and Tablets
Spyware
Spyware Documentation and Evidence
Forensic analysis
Commercial spyware detectors (McAfee, Norton, Symantec) may or may not find spyware
Detecting spyware
Has computer been performing strangely?
Has battery been depleting faster than usual?
Keystroke Logging Hardware
*Can be keyboard ports, special keyboards, or mouse
*No software to install or configure ‐ just plug it in
*Need physical access to install & remove
Victim Safety
*Educate victims about possibilities
* Spyware “cleaners” do not guarantee safety* Removal may escalate offender’s behavior
* Encourage victims to use a “safer” computer * Shared computers at the library or elsewhere
Social Media
Social Media Reach
TechCrunch 2017
Exploiting Social Media
Gather information on the victim
• Location• PlansCommunicate
• Post on victim’s page
• Post about the victim on their own or other’s pages
Create fake sites
Facebook Documentation*Capture and save screenshots (PrntScrn)
*Some sites offer a “download your information” service in account settings
Facebook Online Request
Facebook.com/recordsFacebook.com/safety/groups/law/guidelines (general info)
Same Process as Facebook
Online:
* Law enforcement officials are encouraged to use the Law Enforcement Online Request System at facebook.com/records for the submission, tracking and processing of requests. Please note that a government‐issued email address is required to access the Law Enforcement Online Request System.
Mail:
* Attn: Law Enforcement Response Team1601 Willow RoadMenlo Park, CA 94025
Email:
Snapchat
SnapChat Ghost Mode
Ghost Mode allows you to turn your location on and off on the Map!
Only Me (no one sees you)
Select Friends (you choose who sees you)
My Friends (all your friends can see you)
SnapChat
Legal process submissions and general questions: [email protected]
All requests must contain a username
Vanity name. Non‐unique. Can’t be used to locate a Snapchat account
Username. Unique. Can be used to locate a Snapchat account
Nonconsensual Distribution of Intimate Images
Non‐Consensual Distribution of Intimate Images
*Sexually explicit media that is publicly shared online without the consent of the pictured individual
* 34 states + DC have laws, federal law proposed www.cybercvilrights.org/revenge‐porn‐laws
Resources for Non‐Consensual Distribution of Intimate Images
*Safeshepherd.com/advocates
*Cyberrightsproject.com
*Cybercivilrights.org For victims: 1‐844‐878‐CCRI
*Cagoldberglaw.com
*Dmcadefender.com
*Copybyte.com
Resources
Documentation
STALKING INCIDENT LOG
Date Time Description of IncidentLocation of
IncidentWitness Name(s)
(Attach Address and Phone #)Police Called
(Report #)Officer Name
(Badge #)
www.aequitasresource.org
Going Forward
Discuss technology safety concerns with victims of stalking
Consider all forms of technology that might be utilized by stalkers
Safety plan with stalking victims around their use of technology
Jennifer Landhuis, M.S.Director
[email protected]‐819‐1381
@followuslegally