DIGITAL STALKING

  • Upload
    gavril

  • View
    47

  • Download
    1

Embed Size (px)

DESCRIPTION

DIGITAL STALKING. Patricia Kubistal & Nancietta Stocking. WHO IS WATCHING?. Mary Jane has no computer; hence no email. She has credit cards, store savings cards, library card, a transit card and a cell phone. SO WHO IS WATCHING HER?. - PowerPoint PPT Presentation

Citation preview

DIGITAL STALKING

DIGITAL STALKING

Patricia Kubistal&Nancietta Stocking

Mary Jane has no computer; hence no email.She has credit cards, store savings cards, library card, a transit card and a cell phoneWHO IS WATCHING?

The grocery stores know what she purchases, when she purchases it. They have personal information when she applied for the store savings card.SO WHO IS WATCHING HER?

Stores restock their shelves based on the UPC codes.Coupons are developed to encourage salesDirect mailings are sent to her.GROCERY STORE

When her cell phone is on, the phone company can track where she is through pings off cell towersPHONE COMPANY

ANTI-TERROR PROGRAMS

Cell companies collect data every time a mobile phone accesses a tower, whether or not a call is made. That leaves a time-coded trail of user movement accessible to law enforcement.CELL TOWERS

The gold standard of personal tracking devices smartphones have embedded GPS, are internet-connected, and can run software. They allow location and behavior to be tracked through your cellular provider, by the device manufacturer, and by the developers of the apps you install.SMARTPHONES

She is caught on film nearly 200 times dailyThere are 30 million CCTV cameras in AmericaAbout 200 Million US citizens have had their call records monitored since 9/11

MARY JANES DAY

Since 9/11 NSA has been collecting detailed call history and conversations from the nations three largest phone companies to build the largest data base in the worldDATA BASES

The IRS had 1.8 million cases of tax refund fraud in 2012. This includes direct deposits as well as hard checks

PAYS HER TAXES

Banks and credit card companies routinely sell your shopping data to marketers. Even the feds can sniff your purchases in real time via a warrantless hot watch request

CREDIT CARDS

Customer data is big businessfor target advertising, sales leads, and behavioral analysis. Some firms collect data directly from customers; others use data aggregators which amass bigger, richer databases from multiple sources. That information is sometimes hacked due to substandard security, and much of it is subject to subpoena by law enforcement.COMPANIES

Scan you face to tell your gender and age.Then the content of the bill board changes content to respond to the person viewing it. Promotion video by Intel showing how it works

DIGITAL BILLBOARDS

U. S. POST OFFICE LOGS ALL MAIL

Load antivirus software onto your smartphone and keep updated.Apple has free one at iTunes AVG Safe Browser.

SMARTPHONES

Download apps only from usually reliable sources such as Google Play or App store for Android on Amazon.comPROTECTING YOUR PHONE

SPEAKING OF APPs

Set a pass code on your smartphone.Consider tracking software for lost or stolen phoneKEEP YOUR PHONE SAFE

Mary Sue has a computer and uses the internet and has an email count. She is tracked by computer cookies

MARY SUE AND STALKING

Cookies are the nexus for most online snooping. PCs can be watched to monitor your browsing habits or taken over outright by spyware, enabling remote access to all of your personal files and control of the device itself.PERSONAL COMPUTERS

Retailers such as Amazon and Apples iTunes have made customer profiling part of their business strategy. Many stores use cookies, pixel tags, and Web beacons to track you to other sites as wellso the product you browsed at one site shows up as an ad at another site.ON LINE STORES

Through tracking devices, the browsers records your movement to sites and individuals and corporations receive those movementsPRIVACY ISSUES

TRACKING SITES

Searches and online email accounts provide rich sources of data for advertisers; weak password protection can also make personal online accounts prime targets for hackersONLINE SERVICES

GOOGLE MAPS

AquariusAquarius1Aquar$ius1Aqu57ar$iu3s9.08 minutes1.59 days19.24 years17,400,000 yearsPASSWORDS AND TIME TO CRACK

Data breaches persist despite security push in government agencies, companies, medical records, restaurants, stores, bank pin numbers, etc.

DATA BREACHES

Every move we make is subject to digital prying eyes, and once your data has been collected, there is no telling where it will end up

SURVEILLANCE STATE

GOVERNMENT MONITORS

Toy Drone locks on a face in the distance, then identifies it.Can take a masked face and focus only on eyebrows and search a catalog and identifyFACIAL IDENTIFICATION

UTZAVUtzav is a system that take your photo and the software maps a face using dots like electronic measles and creates something as unique as a finger print: a face print. Pins and passwords are giving way to face prints. Face recognition can be done without your knowledge.

In the past 12 years law enforcement agencies have been granted vast surveillance powers through changes in both the law and the technology available to them. Local, state and federal authorities routinely access records about customers from private industry as well.LAW ENFORCEMENT

Both the quantity and capability of surveillance cameras have increased dramatically in the past decade. Modern license plate readers can process 1800 plates per minute, and facial recognition systems such as the one used by the Pennsylvania Justice Network can automatically match faces from surveillance footage to mug shots in criminal databases.CAMERAS

Cameras monitor the outside of cars but many cars have internet-connected telematics systems on the inside that log location and driver behavior. Insurers now offer safe-driver discounts for drivers who enable tracking devices on their vehicles. VEHICLES

Access to Global Positioning System satellites is now routinely built into cars, smart phones and tablet computers, making it possible to locate any of these devices to within 25 feet.GPS DEVICES

All public Wi-Fi should be treated with cautionUpdate your laptop, tablet or smartphone security software immediately before staying at a hotel

HOTEL WI-FI

Never use hotel WI-FI for on line banking, credit card account management or investment managementDo not use hotel lobby computers for these things eithersHotel WI-FI (Continued)

Check with hotel to confirm you are logging into the authentic hotel WI-FI. Key loggers are often loaded onto public computersHOTEL WI-FI (Continued)