How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine...

12
Please do not post online © National Network to End Domestic Violence 1 Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen © 2016 NNEDV How do abusers misuse phones and location devices? What are survivors telling you? © 2016 NNEDV 2 CELL PHONES: SPYING & MONITORING © 2016 NNEDV 3

Transcript of How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine...

Page 1: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 1

Phones & Location

TechnologySummit2016SanFrancisco,CAEricaOlsen

© 2016 NNEDV

How do abusers misuse phones and location devices?

What are survivors telling you?

© 2016 NNEDV 2

CELL PHONES:SPYING & MONITORING

© 2016 NNEDV 3

Page 2: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 2

Simple Complex

• Monitoring or changing functions or features. 

–Voicemail, Texts, Screen Readers, Settings, Bills

• Manipulating features

• Eavesdropping on calls

• Spying on activity

© 2016 NNEDV 4

Spyware/Monitoring Software

• Software requires physical access to the phone.

• Common features:

– Track GPS location.

– Monitor calls, texts, messages.

– Record/listen to calls.

– Records websites visited.

– Can view pictures taken.

– Access contents on phone.

• Difficult to detect.

© 2016 NNEDV 5

How It Works

© 2016 NNEDV 6

Page 3: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 3

Stealth Genie Case• 2014 – Creator of Stealth Genie was convicted of selling and advertising an interception device. 

• Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. 

• First criminal conviction of its kind. 

7© 2016 NNEDV

Detecting Cell Phone Spyware• Unusual battery drain or battery warm when not in use. 

• Spikes in data usage.

• May take longer to shut down. 

• Screen may light up when not using. 

• May hear clicks or sounds when on calls. 

• Additional incoming calls on bill that user didn’t receive. 

• Abuser knows things that s/he could only know if they have access to the phone. 

• Perpetrator has or had physical access.

© 2016 NNEDV 8

© 2016 NNEDV 9

Page 4: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 4

© 2016 NNEDV 10

Safety Tips

• Trust the survivor’s instincts.

• Narrow down options to identify what could be happening. 

• Strategically use other options for safety. 

• If survivor suspects phone calls are being monitored or recorded, limit what is said and use a safer phone.

• Be careful transferring content to a new phone. 

© 2016 NNEDV 11

PHONES & CELL PHONES:IMPERSONATION

I am never ever evergonna answer your calls.

© 2016 NNEDV 12

Page 5: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 5

Text Messaging

• Ways to send a text message:

– From a phone to a phone (even to a landline).

– From your PC using the carrier’s website.

– From E‐mail, by addressing the email to the 10 digit mobile number like this: [email protected]

– Through text messaging apps: WhatsApp, iMessage, BB Message

© 2016 NNEDV 13

Popular Messaging Applications

• WhatsApp

• Viber

• SnapChat

• Signal 

• Most provide text, photos, voice,and short video messages

14© 2016 NNEDV

Text Messaging

• Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or virtual text messaging services.

• Nearly all 50 states explicitly include electronic communication in stalking or harassment laws.

• Apps and services make evidence collection harder and messages creepier.  – Tiger Text

– SnapChat

– WhatsApp

© 2016 NNEDV 15

Page 6: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 6

• Gives caller ability to change number shown on ID, change voice, and record call.

Caller ID Spoofing

© 2016 NNEDV 16

Caller ID Spoofing/Faker

© 2016 NNEDV 17

© 2016 NNEDV 18

Page 7: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 7

Fake Incoming Calls

© 2016 NNEDV 19

Truth in Caller ID Act of 2009

• Signed into law Dec. 22, 2010, prohibits caller ID spoofing for the purposes of defrauding or otherwise causing harm.  In June 2010, The Federal Communications Commission (FCC) adopted rules implementing the Truth in Caller ID Act.

• The FCC’s rules:

– Prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value.

– Subject violators to a penalty of up to $10,000 for each violation of the rules.

– Exempt authorized activities by law enforcement agencies and situations where courts have authorized caller ID manipulation to occur.

© 2016 NNEDV 20

Trap Call

• Shows both the name and number of the person. • Can also record all calls without other person knowing.  

© 2016 NNEDV 21

Page 8: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 8

Phone Safety Tips

• Document threatening and harassing calls and messages. 

• Pay‐as‐you‐go phones purchased with cash.

• Use virtual phone numbers.

– Examples: Google Voice, Burner App, 

– Be strategic when creating accounts. Linking them to current email accounts or accounts that the abuser knows about may connect identity with new phone number.

© 2016 NNEDV 22

LOCATION

© 2016 NNEDV 23

Modern Family

© 2016 NNEDV 24

Page 9: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 9

Family Locator Plans

• Verizon Family Locator, AT&T Family Map, Sprint Safely Family Locator

– Locate a phone/person

– Receive updates about arrival/departure

– Info accessible online, through an app 

© 2016 NNEDV 25

Family Locator Apps

• Life 360 Family Locator

• Family Tracker

• AirCover Family Locator

© 2016 NNEDV 26

Access, Notification & Removal

Access

• Authorized user on the carrier account.

• Often requires physical access to the phone.

Notification

• Some service sends text notification at the beginning, some sends notice periodically.

• May need to install an app and have location turned on.

Removing the service

• Often need to be an authorized account holder.

• Sometimes you can simply delete the app.

© 2016 NNEDV 27

Page 10: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 10

Social-Based Location Apps

• Allows you to connect with friends. 

– Facebook, Foursquare

• Allows you to tell people where you are 

– Twitter, Instagram

• Connect with other people

– Meetup

– Grindr

• Offers deals & discounts

– Foursquare

© 2016 NNEDV 28

Apps Collect Data Information

• Many apps collect location information.

• Some need location information to operate but not all. 

• Assess whether a particular app needs your location information. 

• Most apps should ask if you will allow it to access your location. If it doesn’t allow you to opt‐out, consider not using that app.

© 2016 NNEDV 29

Beware of Accidental Sharing

Geotagging

• Location can be added to pictures taken with phones.

• Some phone apps that connect to social networks must have location access turned on. 

• Photos uploaded to social media may include exif data.

30© 2016 NNEDV

Page 11: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 11

GPS

• Global Positioning System (GPS): tracks person/object using satellite technology.

– Active vs. Passive.

• Used in:

– Cell phones, tablets, laptops.

– Vehicle Navigation Systems (On‐Star, Garmin).

– Location devices for pets, elderly, children, assets.

© 2016 NNEDV 31

Monitor Teen Drivers

• Know what time they left, what time they arrived and a map to show you the exact location that the car was parked. 

• Alerts notify when teen leaves school early, is speeding, or visits friend. 

• Can set speed limit, unlockdoors, enable/disable starter, honk horn.

© 2016 NNEDV 32

GPS Hidden In Cars

© 2016 NNEDV 33

Page 12: How do abusers misuse phones and location devices? What ... · • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. ... • Pay‐as‐you‐go

Please do not post online

© National Network to End Domestic Violence 12

Safety Tips

• Use strong, unique passwords. 

• Be aware of what information apps gather.

• Log out of accounts that are accessible without passwords.

• Be cautious about “jailbreaking” or “rooting” your device.

• Some security apps will allow remote “auto‐wipe,” monitor battery usage, data usage, etc.

© 2016 NNEDV 34

Resources

• www.techsafety.org

• www.nnedv.org/safetynetdocs

• www.tools.nnedv.org

• www.womenslaw.org

Safety Net Project, [email protected]

© 2016 NNEDV 35

QUESTIONS?

© 2016 NNEDV 36