emerging uses of cutting edge technologies...spybubble web server for your viewing. 19 how do they...

53
Emerging Uses of Cutting Edge Technologies Priscilla Grantham Sr. Research Counsel National Center for Justice and the Rule of Law Copyright © 2011 National Center for Justice and the Rule of Law 1

Upload: others

Post on 20-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Emerging Uses of Cutting Edge Technologies

Priscilla GranthamSr. Research Counsel

National Center for Justice and the Rule of Law

Copyright © 2011 National Center for Justice and the Rule of Law 1

Page 2: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

WEBINAR TIPS:1. To reduce background noise, please:

• Power off cell phones• Turn down (or mute) computer speakers if accessing webcast through telephone

2. The presenter is utilizing VoIP (Voice Over Internet Protocol) technology to deliver the audio portion of the webinar. In the event the audio malfunctions, please stand by; the presenter will quickly re‐join the webinar via telephone and continue the presentation.

3. Attendees will be muted during webinar in an effort to reduce background noise.

4. If you want to ask a question, type it in the chat box in the control pane on the right side of your screen, and then click the “send” button.

5. Questions are typically addressed at the end of the presentation.6. Please include your email and phone number with question. If presenter 

does not have time to answer your question during the webcast, he/she will contact you following the webcast.

Page 3: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Type Question in this BoxWEBINAR

3

Page 4: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Topics:

• Cloud computing• Web‐based Apps• Cell phone spy‐ware• Computer monitoring software• Low‐tech and high tech methods to avoid detection, and

• private peer-to-peer networks• IP cameras

4

Page 5: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Cloud Computing• Workload shift• Hardware & software demands on user’s side decreased

• Users do not download and install programs on their own device

• User’s computer runs cloud computing system’s interface software – i.e., a web browser

• Applications provided & managed by cloud server; Data stored remotely by cloud server

5

Page 6: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Cloud Computing

cloud computing6

Page 7: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Word processing on user’s system…

Create document

Access document

7

Page 8: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Web-based document creation:

New document

8

Page 9: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Accessing Web-based document:

9

Page 10: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Web-based photo storage

10

Page 11: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Dropbox• Web based• File synchronization

• Computers• Phones• Dropbox website 

• File backup• File sharing

• public• private

11

Page 12: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

drop box vid

12

Page 13: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Computer Program v. Web Apps:

Programs

Outlook, Eudora

PowerPoint

Microsoft Word, 

WordPerfect

Web Apps

Gmail, Hotmail

Prezi, Google Presentations

Google Docs

13

Page 14: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

… Chromebooks• “New model of computing”• Apps, documents and settings are stored in the cloud• Designed to defend against threat of malware and viruses

• runs millions of web apps – games, spreadsheets, photo editors

• Boots in less than 10 seconds• Automatically updates itself• Built in wi‐fi and 3G• Webcam• No one using your chromebook will have access to your data

But this could never take off….

chromebook

14

Page 15: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Opas iPad 15

Page 16: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Cell phone spyware:

• Listen in to an active phone call (Call interception)• Secretly read texts, call logs, emails, cell IDs• Listen to phone’s surroundings• Secret GPS tracking• 100% undetectable in operation

Is your son buying drugs?Is your daughter still talking to that no good deadbeat?Is your employee stealing company information?

16

Page 17: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Cell phone spyware:

cell phone spyware video

Protect your children:•Remote, unobtrusive monitoring•Texting & driving prevention•Sexting prevention•Cyberbully prevention•Cell tracking

17

Page 18: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

SpyBubble, FlexiSpy

18

Page 19: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Spyware

• Call tracking• Read and text msg sent or received, even if phone holder erases msg

• GPS location tracking – track exact position of phone using Google maps

• Phone book access – see every # stored in phone’s memory

• Email tracking – logs each incoming and outgoing email

• URL tracking – see which web sites user has visited

• Photo tracking – uploads all photos sent and received on the phone to a web server for your viewing.spybubble 19

Page 20: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

How do they get away with it…

20

Page 21: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Malware is installed on computers and then collects information about  users without their knowledge.

Malware on Computers

21

Page 22: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

22

Page 23: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Spyware collects personal information, such as Internet surfing habits& sites visited.

• Can Interfere with user control of computer installing additional software, redirecting Web Browser activity. 

• Can change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. 

23

Page 24: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Spyware , also referred to as Computer Monitoring Software, is commercially available on internet ‐ relatively inexpensive, usually less than $100.00.  

• It is important to keep your Anti Virus definitions up to date.  

• Even then, it is not always detected.

24

Page 25: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

25

Page 26: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Keystrokes Typed: Log all keystrokes typed by the user. 

• Email Forwarding: Have all emails that a user sends and receives forwarded to your own private email account for later viewing. 

• Desktop Screenshots: Log screenshots of the active window the remote user is working in and interacting with.

• Websites Visited: Log all websites visited by the user. 

• Internet Connections: Log all internet connections made and attempted by the user. 

• Windows Opened: Log all windows opened and used by the user.

• Chat Conversations: Log both sides of all ICQ, 

MSN, Yahoo!, AOL, AIM messenger conversations! 26

Common Functions – Computer Spyware:

Page 27: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Logs all applications and programs run

• Logs all print jobs 

• Logs all files and folders created and deleted 

• E‐mails typed

• Passwords typed 

• Logs all documents viewed 

• Records and monitors system information on the remote  machine: uptime, memory, ram, and more. 

• You can also remotely shutdown,  reboot, restart, logoff, or freeze the remote PC as well!

• System Shutdowns and User changes27

Page 28: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Hide files or Folders

• Low‐tech• Renaming• Making invisible• Hiding from other users of computer

• High tech• Steganography• Encryption

28

Page 29: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Hiding Files or Foldershiding files and folders vid

• Change folder icons• Change extensions when saving

My illegal photos MS‐Dos Batch file icon

29

Page 30: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Steganography

• Concealing data within data

• Steganography lets users insert and extract hidden data into and from carrier files.

• Over 800 digital steganography applications

30

Page 31: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Steganography

• original image: 200 x 200 pixels, file size 88kb

• Remove all but  the 2 least significant bits of each color component 

• Recovered image• 200x200 pixels, file size 19kb

31

Page 32: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Keepin’ it on the Down Low….Maintaining privacy on line

• Anonymizers• Proxy servers• Private online file sharing

32

Page 33: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Anonymous surfingstrips your p.i.i.

• Block organization’s URL filter that blocks certain sites

• Allows one to surf through anonymous proxy

• Some services, i.e. Tor, require user to install application on the computer, others, i.e. Roxprox, do not.

33

Page 34: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

anonymizer.com “Your IP address is your ID.”

• Anonymous surfing• Protected Wi‐Fi• Encrypted VPNvirtual Private network

• Untraceable IP rotation• Internet activities—Web browsing‚ email‚ chat‚ webcam are kept private and anonymous.  Single point anonymizer

34

Page 35: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Proxy Servers:• Server is an intermediary to client seeking info from another server.

• Bypass work, parental controls

• Proxiify.com, Youhide.com

35

Page 36: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Change my IP address• www.whatismyipaddress.com• Unique number assigned to each computer assigned to the 

Internet• May be static or dynamic

change my IP 36

Page 37: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Private Online File SharingPrivate P2P Networks

• Network of trusted sources• Share files only with those you know and trust GigaTribe 2Peer QNext

37

Page 38: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

“The term Private Internet describes an enabling technology that moves your Internet activities from a public, unsecure environment to one that is private and secure. The Private Internet allows one to move from feeling outnumbered in a possibly hostile crowd to relaxing in a comfortable space filled only with familiar faces.”

38

Page 39: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

2Peer – Features:Feature 2PeerDesktop      2PeerWeb

Browse Friends' ContentKeyword search for filesDownload filesInvite Users to your Private InternetOrganize users into groupsChange your profile informationUpdate your preference settingsView AlbumsDownload foldersShare folders and filesShare albumsChatView transfer historyCreate Albums

✔✔✔✔✔✔✔✔✔✔✔✔✔✔

✔✔✔✔✔✔✔✔ 39

Page 40: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

2Peer 40

Page 41: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

GigaTribe - Features:

• All data transfers are encrypted• No limitation on quantity or file size• No wasting time uploading files:

Select folders to share Contents of selected folders instantly accessible

to friends Friends browse and download files they want

• Data remains under your control; not saved on another company’s equipment

• Includes personal chat and private blog41

Page 42: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

IP and Hidden Cameras

Just a few years ago the “Pinhole” surveillance camera was the at the cutting edge of stealth and concealment.

They are small and easily hidden in just about anything. 

42

Page 43: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Easy as 1, 2, 3…

43

Page 44: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Pinhole Camera

44

Page 45: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Pinhole Camera in a pack of Cigarettes

45

Page 46: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Many Digital cameras and Cell Phone Cameras today record Exif data and Geo tagging information  that can be viewed with free readily available software from the internet.

Victims who post these images in a public forum on the internet are susceptible to revealing to stalkers dates/ times and even specific locations of where they have been.

46

Page 47: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Man installed GPS in estranged wife’s car• State stalking statute contained language: “under surveillance.”

• Ct. ruled surveillance included electronic surveillance;

• Husband’s act constituted stalking.

State v. Sullivan, 53 P.3d 1181 (Colo. Ct. App. 2002)

47

Page 48: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Man & estranged wife living in same home

• Husband installed tiny video camera in wall of her bedroom.

• Ct. held that use of this technology constituted stalking under state law.

H.E.S. v. J.C.S., 815 A.2d 405 (N.J. 2003)

48

Page 49: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

• Can be hardwired & plugged into outlet for continuous and uninterrupted recording.

• Limited by the size of the storage device which was usually a VHS tape.

• Innovations saw advent of wireless transmissions to remote storage w/ battery powered cameras.

• Limited by distance radio signal could transmit signal to the storage device.  (Usually not very far — limited by walls, buildings, other physical obstacles.

49

Page 50: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

•Draw backs of older camera systems corrected w/ the blending of Pinhole surveillance cameras and the Internet.

• IP Cameras (Internet Protocol Cameras) allowed viewing of cameras in live time from anywhere in the WORLD that had Internet connection.

IP Cameras

chinavision50

Page 51: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Setting up your IP Camera:• High speed Internet service

• CCTV Camera or “Network Ready” camera

• A Video Server

• Either the Video Server or the "Network Ready" Camera will provide a unique computer "address" known as an I.P.  Address. 

• ANY Computer can search and FIND the IP address, and connect to it. Depending on how you've configured the network, that computer can be next to the camera, or a million miles away, it really doesn't matter.

51

Page 52: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

Topics:

• Cloud computing• Web‐based Apps• Cell phone spy‐ware• Computer monitoring software• Low‐tech and high tech methods to avoid detection, and

• private peer-to-peer networks• IP cameras

52

Page 53: Emerging Uses of Cutting Edge Technologies...spybubble web server for your viewing. 19 How do they get away with it… 20 Malware is installed on computers and then collects information

53

Thank YouPriscilla Grantham

[email protected](662) 915.6929www.NCJRL.org