1 / 44

DIGITAL STALKING

DIGITAL STALKING. Patricia Kubistal & Nancietta Stocking. WHO IS WATCHING?. Mary Jane has no computer; hence no email. She has credit cards, store savings cards, library card, a transit card and a cell phone. SO WHO IS WATCHING HER?.

gavril
Download Presentation

DIGITAL STALKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DIGITAL STALKING

  2. Patricia Kubistal&Nancietta Stocking

  3. WHO IS WATCHING? • Mary Jane has no computer; hence no email. • She has credit cards, store savings cards, library card, a transit card and a cell phone

  4. SO WHO IS WATCHING HER? • The grocery stores know what she purchases, when she purchases it. They have personal information when she applied for the store savings card.

  5. GROCERY STORE • Stores restock their shelves based on the UPC codes. • Coupons are developed to encourage sales • Direct mailings are sent to her.

  6. PHONE COMPANY • When her cell phone is on, the phone company can track where she is through pings off cell towers

  7. ANTI-TERROR PROGRAMS

  8. CELL TOWERS • Cell companies collect data every time a mobile phone accesses a tower, whether or not a call is made. That leaves a time-coded trail of user movement accessible to law enforcement.

  9. SMARTPHONES • The gold standard of personal tracking devices smartphones have embedded GPS, are internet-connected, and can run software. They allow location and behavior to be tracked through your cellular provider, by the device manufacturer, and by the developers of the apps you install.

  10. MARY JANE’S DAY • She is caught on film nearly 200 times daily • There are 30 million CCTV cameras in America • About 200 Million US citizens have had their call records monitored since 9/11

  11. DATA BASES • Since 9/11 NSA has been collecting detailed call history and conversations from the nations three largest phone companies to build the largest data base in the world

  12. PAYS HER TAXES • The IRS had 1.8 million cases of tax refund fraud in 2012. This includes direct deposits as well as hard checks

  13. CREDIT CARDS • Banks and credit card companies routinely sell your shopping data to marketers. Even the feds can sniff your purchases in real time via a warrantless “hot watch” request

  14. COMPANIES • Customer data is big business—for target advertising, sales leads, and behavioral analysis. Some firms collect data directly from customers; others use data aggregators which amass bigger, richer databases from multiple sources. That information is sometimes hacked due to substandard security, and much of it is subject to subpoena by law enforcement.

  15. DIGITAL BILLBOARDS • Scan you face to tell your gender and age. • Then the content of the bill board changes content to respond to the person viewing it. • Promotion video by Intel showing how it works

  16. U. S. POST OFFICE LOGS ALL MAIL

  17. SMARTPHONES • Load antivirus software onto your smartphone and keep updated. • Apple has free one at iTunes AVG Safe Browser.

  18. PROTECTING YOUR PHONE • Download apps only from usually reliable sources such as Google Play or App store for Android on Amazon.com

  19. SPEAKING OF APP’s

  20. KEEP YOUR PHONE SAFE • Set a pass code on your smartphone. • Consider tracking software for lost or stolen phone

  21. MARY SUE AND STALKING • Mary Sue has a computer and uses the internet and has an email count. • She is tracked by computer cookies

  22. PERSONAL COMPUTERS • Cookies are the nexus for most online snooping. PCs can be watched to monitor your browsing habits or taken over outright by spyware, enabling remote access to all of your personal files and control of the device itself.

  23. ON LINE STORES • Retailers such as Amazon and Apples iTunes have made customer profiling part of their business strategy. Many stores use cookies, pixel tags, and Web beacons to track you to other sites as well—so the product you browsed at one site shows up as an ad at another site.

  24. PRIVACY ISSUES • Through tracking devices, the browsers records your movement to sites and individuals and corporations receive those movements

  25. TRACKING SITES

  26. ONLINE SERVICES • Searches and online email accounts provide rich sources of data for advertisers; weak password protection can also make personal online accounts prime targets for hackers

  27. GOOGLE MAPS

  28. PASSWORDS AND TIME TO CRACK • 9.08 minutes • 1.59 days • 19.24 years • 17,400,000 years • Aquarius • Aquarius1 • Aquar$ius1 • Aqu57ar$iu3s

  29. DATA BREACHES • Data breaches persist despite security push in government agencies, companies, medical records, restaurants, stores, bank pin numbers, etc.

  30. SURVEILLANCE STATE • Every move we make is subject to digital prying eyes, and once your data has been collected, there is no telling where it will end up

  31. GOVERNMENT MONITORS

  32. FACIAL IDENTIFICATION • Toy Drone locks on a face in the distance, then identifies it. • Can take a masked face and focus only on eyebrows and search a catalog and identify

  33. UTZAV Utzav is a system that take your photo and the software maps a face using dots like electronic measles and creates something as unique as a finger print: a face print. Pins and passwords are giving way to face prints. Face recognition can be done without your knowledge.

  34. LAW ENFORCEMENT • In the past 12 years law enforcement agencies have been granted vast surveillance powers through changes in both the law and the technology available to them. Local, state and federal authorities routinely access records about customers from private industry as well.

  35. CAMERAS • Both the quantity and capability of surveillance cameras have increased dramatically in the past decade. Modern license plate readers can process 1800 plates per minute, and facial recognition systems such as the one used by the Pennsylvania Justice Network can automatically match faces from surveillance footage to mug shots in criminal databases.

  36. VEHICLES • Cameras monitor the outside of cars but many cars have internet-connected telematics systems on the inside that log location and driver behavior. Insurers now offer safe-driver discounts for drivers who enable tracking devices on their vehicles.

  37. GPS DEVICES • Access to Global Positioning System satellites is now routinely built into cars, smart phones and tablet computers, making it possible to locate any of these devices to within 25 feet.

  38. HOTEL WI-FI • All public Wi-Fi should be treated with caution • Update your laptop, tablet or smartphone security software immediately before staying at a hotel

  39. Hotel WI-FI (Continued) • Never use hotel WI-FI for on line banking, credit card account management or investment management • Do not use hotel lobby computers for these things eithers

  40. HOTEL WI-FI (Continued) • Check with hotel to confirm you are logging into the authentic hotel WI-FI. “Key loggers” are often loaded onto public computers

More Related