How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine...
Transcript of How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine...
Please do not post online
© National Network to End Domestic Violence 1
Phones & Location
TechnologySummit2016SanFrancisco,CAEricaOlsen
© 2016 NNEDV
How do abusers misuse phones and location devices?
What are survivors telling you?
© 2016 NNEDV 2
CELL PHONES:SPYING & MONITORING
© 2016 NNEDV 3
Please do not post online
© National Network to End Domestic Violence 2
Simple Complex
• Monitoring or changing functions or features.
–Voicemail, Texts, Screen Readers, Settings, Bills
• Manipulating features
• Eavesdropping on calls
• Spying on activity
© 2016 NNEDV 4
Spyware/Monitoring Software
• Software requires physical access to the phone.
• Common features:
– Track GPS location.
– Monitor calls, texts, messages.
– Record/listen to calls.
– Records websites visited.
– Can view pictures taken.
– Access contents on phone.
• Difficult to detect.
© 2016 NNEDV 5
How It Works
© 2016 NNEDV 6
Please do not post online
© National Network to End Domestic Violence 3
Stealth Genie Case• 2014 – Creator of Stealth Genie was convicted of selling and advertising an interception device.
• Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities.
• First criminal conviction of its kind.
7© 2016 NNEDV
Detecting Cell Phone Spyware• Unusual battery drain or battery warm when not in use.
• Spikes in data usage.
• May take longer to shut down.
• Screen may light up when not using.
• May hear clicks or sounds when on calls.
• Additional incoming calls on bill that user didn’t receive.
• Abuser knows things that s/he could only know if they have access to the phone.
• Perpetrator has or had physical access.
© 2016 NNEDV 8
© 2016 NNEDV 9
Please do not post online
© National Network to End Domestic Violence 4
© 2016 NNEDV 10
Safety Tips
• Trust the survivor’s instincts.
• Narrow down options to identify what could be happening.
• Strategically use other options for safety.
• If survivor suspects phone calls are being monitored or recorded, limit what is said and use a safer phone.
• Be careful transferring content to a new phone.
© 2016 NNEDV 11
PHONES & CELL PHONES:IMPERSONATION
I am never ever evergonna answer your calls.
© 2016 NNEDV 12
Please do not post online
© National Network to End Domestic Violence 5
Text Messaging
• Ways to send a text message:
– From a phone to a phone (even to a landline).
– From your PC using the carrier’s website.
– From E‐mail, by addressing the email to the 10 digit mobile number like this: [email protected]
– Through text messaging apps: WhatsApp, iMessage, BB Message
© 2016 NNEDV 13
Popular Messaging Applications
• Viber
• SnapChat
• Signal
• Most provide text, photos, voice,and short video messages
14© 2016 NNEDV
Text Messaging
• Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or virtual text messaging services.
• Nearly all 50 states explicitly include electronic communication in stalking or harassment laws.
• Apps and services make evidence collection harder and messages creepier. – Tiger Text
– SnapChat
© 2016 NNEDV 15
Please do not post online
© National Network to End Domestic Violence 6
• Gives caller ability to change number shown on ID, change voice, and record call.
Caller ID Spoofing
© 2016 NNEDV 16
Caller ID Spoofing/Faker
© 2016 NNEDV 17
© 2016 NNEDV 18
Please do not post online
© National Network to End Domestic Violence 7
Fake Incoming Calls
© 2016 NNEDV 19
Truth in Caller ID Act of 2009
• Signed into law Dec. 22, 2010, prohibits caller ID spoofing for the purposes of defrauding or otherwise causing harm. In June 2010, The Federal Communications Commission (FCC) adopted rules implementing the Truth in Caller ID Act.
• The FCC’s rules:
– Prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value.
– Subject violators to a penalty of up to $10,000 for each violation of the rules.
– Exempt authorized activities by law enforcement agencies and situations where courts have authorized caller ID manipulation to occur.
© 2016 NNEDV 20
Trap Call
• Shows both the name and number of the person. • Can also record all calls without other person knowing.
© 2016 NNEDV 21
Please do not post online
© National Network to End Domestic Violence 8
Phone Safety Tips
• Document threatening and harassing calls and messages.
• Pay‐as‐you‐go phones purchased with cash.
• Use virtual phone numbers.
– Examples: Google Voice, Burner App,
– Be strategic when creating accounts. Linking them to current email accounts or accounts that the abuser knows about may connect identity with new phone number.
© 2016 NNEDV 22
LOCATION
© 2016 NNEDV 23
Modern Family
© 2016 NNEDV 24
Please do not post online
© National Network to End Domestic Violence 9
Family Locator Plans
• Verizon Family Locator, AT&T Family Map, Sprint Safely Family Locator
– Locate a phone/person
– Receive updates about arrival/departure
– Info accessible online, through an app
© 2016 NNEDV 25
Family Locator Apps
• Life 360 Family Locator
• Family Tracker
• AirCover Family Locator
© 2016 NNEDV 26
Access, Notification & Removal
Access
• Authorized user on the carrier account.
• Often requires physical access to the phone.
Notification
• Some service sends text notification at the beginning, some sends notice periodically.
• May need to install an app and have location turned on.
Removing the service
• Often need to be an authorized account holder.
• Sometimes you can simply delete the app.
© 2016 NNEDV 27
Please do not post online
© National Network to End Domestic Violence 10
Social-Based Location Apps
• Allows you to connect with friends.
– Facebook, Foursquare
• Allows you to tell people where you are
– Twitter, Instagram
• Connect with other people
– Meetup
– Grindr
• Offers deals & discounts
– Foursquare
© 2016 NNEDV 28
Apps Collect Data Information
• Many apps collect location information.
• Some need location information to operate but not all.
• Assess whether a particular app needs your location information.
• Most apps should ask if you will allow it to access your location. If it doesn’t allow you to opt‐out, consider not using that app.
© 2016 NNEDV 29
Beware of Accidental Sharing
Geotagging
• Location can be added to pictures taken with phones.
• Some phone apps that connect to social networks must have location access turned on.
• Photos uploaded to social media may include exif data.
30© 2016 NNEDV
Please do not post online
© National Network to End Domestic Violence 11
GPS
• Global Positioning System (GPS): tracks person/object using satellite technology.
– Active vs. Passive.
• Used in:
– Cell phones, tablets, laptops.
– Vehicle Navigation Systems (On‐Star, Garmin).
– Location devices for pets, elderly, children, assets.
© 2016 NNEDV 31
Monitor Teen Drivers
• Know what time they left, what time they arrived and a map to show you the exact location that the car was parked.
• Alerts notify when teen leaves school early, is speeding, or visits friend.
• Can set speed limit, unlockdoors, enable/disable starter, honk horn.
© 2016 NNEDV 32
GPS Hidden In Cars
© 2016 NNEDV 33
Please do not post online
© National Network to End Domestic Violence 12
Safety Tips
• Use strong, unique passwords.
• Be aware of what information apps gather.
• Log out of accounts that are accessible without passwords.
• Be cautious about “jailbreaking” or “rooting” your device.
• Some security apps will allow remote “auto‐wipe,” monitor battery usage, data usage, etc.
© 2016 NNEDV 34
Resources
• www.techsafety.org
• www.nnedv.org/safetynetdocs
• www.tools.nnedv.org
• www.womenslaw.org
Safety Net Project, [email protected]
© 2016 NNEDV 35
QUESTIONS?
© 2016 NNEDV 36