Top Banner
1 Stalking 2.0 The Use of Technology to Stalk Jennifer Landhuis, Stalking Prevention, Awareness, and Resource Center (SPARC) This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this (document/program/exhibit) are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women. September 10, 2018 at 2-3:30pm CDT Use of Technology to Stalk InPerson Training Webinars Online Resources Individual & Organizational Assistance Policy/Protocol Development & Consultation National Stalking Awareness Month Materials
22

September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Sep 14, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

1

Stalking 2.0

The Use of Technology to Stalk

Jennifer Landhuis, Stalking Prevention, Awareness,

and Resource Center (SPARC)

This project was supported by Grant No. 2015-TA-AX-K027 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this (document/program/exhibit) are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women.

September 10, 2018 at 2-3:30pm CDT

Use of Technology to Stalk

In‐Person Training

Webinars

Online Resources

Individual & Organizational Assistance

Policy/Protocol Development & Consultation

National Stalking Awareness Month Materials

Page 2: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

For Additional Resources*www.stalkingawareness.org (coming soon!)

* Training modules

* Victim resources

* Practitioner guides

*Webinars

*Follow us on TwitterSPARC @followuslegally

Fair Use

This presentation includes the creative work of others. This property is being used by permission or under claim of “fair use” (17 USC § 107). This presentation was created pursuant to fair use guidelines, and further use or distribution is prohibited.

Defining Stalking

Behavioral

Statutory

Page 3: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Stalking

A pattern of behavior directed at a specific person that would cause a reasonable person to feel fear

Behaviors Involving Technology

IPV Stalking and Technology*Stalker’s access to victim accounts

* Infer or compel disclosure of credentials

* Offender is owner of account

*Victims often report having “no idea” of what stalker may have done to their device

Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON

HUMAN‐COMPUTER INTERACTIONS (2017)

Page 4: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Professionals and Technology

*Shared social circles make it nearly impossible to block the stalker. Victims report trusting the “wrong person”

*A small percentage of professionals include discussion of risk factors related to technology

*Disconnecting is often not realistic or safe

Freed et al., Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Mutiple Stakeholders, 1(46) PACM ON

HUMAN‐COMPUTER INTERACTIONS (2017)

Cell Phone Technologies

TrapCall (trapcall.com)

Page 5: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Call and Text Spoofing

Gives caller ability to change number shown on caller ID or text, change sound of voice and to record calls

Video clip   

Spoof Phone Calls

Page 6: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Evidence with a SpoofCard

*Phone records from: victim, “friend”, and suspect

*Victim’s records show “friend” called

* Friend’s records show no call

* Suspect’s records show a call to SpoofCard* Call the number and record

* Financial records of suspect

Evidence with an App

* If you have access to suspect’s phone, screen shot of app downloaded

* If no access, can you access “store” to look for a history of the app being downloaded

* Financial records if the suspect paid for the app

*No person or entity in the United States shall, with the intent to defraud, cause harm, or wrongfully obtain anything of value, knowingly cause, directly or indirectly, any caller identification service to transmit or display misleading or inaccurate caller identification information 

*FCC can levy up to $10,000 per violation 

In 2016 the FCC filed a Notice of Apparent Liability against two individuals and proposed levying a fine of $25,000 each. 

Truth in Caller ID Act, 2009

Page 7: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Filing a Complaint With FCC

* File a complaint online at https://consumercomplaints.fcc.gov 

* By phone 1‐888‐CALL‐FCC (1‐888‐225‐5322); TTY: 1‐888‐TELL‐FCC (1‐888‐835‐5322); ASL: 1‐844‐432‐2275  

* By mail (include your name, address, contact information and as much detail about your complaint as possible)Federal Communications Commission Consumer and Governmental Affairs Bureau Consumer Inquiries and Complaints Division 445 12th Street, S.W. Washington, DC 20554

Global Positioning Systems (GPS) and Locating Devices

GPS Devices

Page 8: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose
Page 9: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Geotagging

Camera GPS Geotagging

Exif Viewers Show Geo‐Info

Exif: Exchangeable image file format: Descriptive data (meta‐data) in an image file that include the date the photo was taken, resolution, shutter speed, focal length and geolocation

Page 10: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

EXIF Data

EXIF Data

Sites that strip EXIF data before posting photos

• Facebook• Twitter• eBay• Instagram – unless pic was added to Photo Map

• Flickr – gives the option

Sites that DO NOT strip EXIF data before posting photos:

• Google

• Tumblr

• DropBox

• Email

Disabling Geo‐Data

Search “how to disable geotagging on a [phone 

make/model]”

Page 11: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Cell Phone Spyware

Cell Phone Spyware

Spyware

*Overt Spyware (Like SpyGenie) 

*Dual‐use apps: designed for a legitimate purpose but can be repurposed by a stalker (Find my iPhone)

*Most require physical access to the phone

*Many are covert 

Page 12: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Detecting Cell Phone Spyware

Offender knows things that they could only know if they have access to the phone

Battery overuse and/or high data usage

Offender has or had physical access

Clicks or sounds when on calls 

Cell Phone Safety

Documentation

Document communications

*Audio: on phone and separately

* Text:

*On phone

*Digital image of phone face

*StitchIt; Tailor Apps*Victims can get detailed copies of their own phone bills

Page 13: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Cameras

How Can Cameras Be Disguised?

Camera Considerations

Equipment is inexpensive and easy to access

Look for cameras or common objects in which cameras may be hidden 

Camera detection

•Signal detectors

•Lens detectors

Page 14: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Computers and Tablets

Spyware

Spyware Documentation and Evidence

Forensic analysis

Commercial spyware detectors (McAfee, Norton, Symantec) may or may not find spyware

Detecting spyware

Has computer been performing strangely? 

Has battery been depleting faster than usual?

Page 15: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Keystroke Logging Hardware

*Can be keyboard ports, special keyboards, or mouse

*No software to install or configure ‐ just plug it in

*Need physical access to install & remove

Victim Safety

*Educate victims about possibilities

* Spyware “cleaners” do not guarantee safety* Removal may escalate offender’s behavior

* Encourage victims to use a “safer” computer * Shared computers at the library or elsewhere 

Social Media

Page 16: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Social Media Reach

TechCrunch 2017

Exploiting Social Media

Gather information on the victim

• Location• PlansCommunicate

• Post on victim’s page

• Post about the victim on their own or other’s pages

Create fake sites

Facebook

Page 17: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Facebook Documentation*Capture and save screenshots (PrntScrn)

*Some sites offer a “download your information” service in account settings

Facebook Online Request

Facebook.com/recordsFacebook.com/safety/groups/law/guidelines (general info)

Instagram

Page 18: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Same Process as Facebook

Online:

* Law enforcement officials are encouraged to use the Law Enforcement Online Request System at facebook.com/records for the submission, tracking and processing of requests. Please note that a government‐issued email address is required to access the Law Enforcement Online Request System.

Mail:

* Attn: Law Enforcement Response Team1601 Willow RoadMenlo Park, CA 94025

Email:

* [email protected]

Snapchat

SnapChat Ghost Mode

Ghost Mode allows you to turn your location on and off on the Map! 

Only Me (no one sees you)

Select Friends (you choose who sees you) 

My Friends (all your friends can see you)

Page 19: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

SnapChat

Legal process submissions and general questions: [email protected]

All requests must contain a username

Vanity name. Non‐unique. Can’t be used to locate a Snapchat account

Username. Unique.  Can be used to locate a Snapchat account

Nonconsensual Distribution of Intimate Images

Non‐Consensual Distribution of Intimate Images 

*Sexually explicit media that is publicly shared online without the consent of the pictured individual

* 34 states + DC have laws, federal law proposed www.cybercvilrights.org/revenge‐porn‐laws

Page 20: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Resources for Non‐Consensual Distribution of Intimate Images

*Safeshepherd.com/advocates

*Cyberrightsproject.com

*Cybercivilrights.org  For victims: 1‐844‐878‐CCRI

*Cagoldberglaw.com

*Dmcadefender.com

*Copybyte.com

Resources

Documentation

STALKING INCIDENT LOG

Date Time Description of IncidentLocation of

IncidentWitness Name(s)

(Attach Address and Phone #)Police Called

(Report #)Officer Name

(Badge #)

Page 21: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

www.aequitasresource.org

Page 22: September 10, 2018 at 2-3:30pm CDT · 9/10/2018  · Cell Phone Spyware Cell Phone Spyware Spyware *Overt Spyware (Like SpyGenie) *Dual‐use apps: designed for a legitimate purpose

Going Forward 

Discuss technology safety concerns with victims of stalking

Consider all forms of technology that might be utilized by stalkers

Safety plan with stalking victims around their use of technology

Jennifer Landhuis, M.S.Director

[email protected]‐819‐1381

@followuslegally