Please do not post online
Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen
© 2016 NNEDV
How do abusers misuse phones and location devices? What are survivors telling you?
© 2016 NNEDV
2
CELL PHONES: SPYING & MONITORING © 2016 NNEDV
© National Network to End Domestic Violence
3
1
Please do not post online
Simple
Complex
• Monitoring or changing functions or features. – Voicemail, Texts, Screen Readers, Settings, Bills • Manipulating features • Eavesdropping on calls • Spying on activity © 2016 NNEDV
4
Spyware/Monitoring Software • Software requires physical access to the phone. • Common features: – – – – – –
Track GPS location. Monitor calls, texts, messages. Record/listen to calls. Records websites visited. Can view pictures taken. Access contents on phone.
• Difficult to detect. © 2016 NNEDV
5
How It Works
© 2016 NNEDV
© National Network to End Domestic Violence
6
2
Please do not post online
Stealth Genie Case • 2014 – Creator of Stealth Genie was convicted of selling and advertising an interception device. • Was ordered to pay $500,000 fine and hand over the software’s source code to the authorities. • First criminal conviction of its kind.
7
© 2016 NNEDV
Detecting Cell Phone Spyware Unusual battery drain or battery warm when not in use. Spikes in data usage. May take longer to shut down. Screen may light up when not using. May hear clicks or sounds when on calls. Additional incoming calls on bill that user didn’t receive. • Abuser knows things that s/he could only know if they have access to the phone. • Perpetrator has or had physical access. • • • • • •
8
© 2016 NNEDV
© 2016 NNEDV
9
© National Network to End Domestic Violence
3
Please do not post online
© 2016 NNEDV
10
Safety Tips • Trust the survivor’s instincts. • Narrow down options to identify what could be happening. • Strategically use other options for safety. • If survivor suspects phone calls are being monitored or recorded, limit what is said and use a safer phone. • Be careful transferring content to a new phone. © 2016 NNEDV
11
I am never ever ever gonna answer your calls.
PHONES & CELL PHONES: IMPERSONATION © 2016 NNEDV
© National Network to End Domestic Violence
12
4
Please do not post online
Text Messaging • Ways to send a text message:
– From a phone to a phone (even to a landline). – From your PC using the carrier’s website. – From E‐mail, by addressing the email to the 10 digit mobile number like this:
[email protected] – Through text messaging apps: WhatsApp, iMessage, BB Message
© 2016 NNEDV
13
Popular Messaging Applications • • • •
WhatsApp Viber SnapChat Signal
• Most provide text, photos, voice, and short video messages © 2016 NNEDV
14
Text Messaging • Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or virtual text messaging services. • Nearly all 50 states explicitly include electronic communication in stalking or harassment laws. • Apps and services make evidence collection harder and messages creepier. – Tiger Text – SnapChat – WhatsApp © 2016 NNEDV
© National Network to End Domestic Violence
15
5
Please do not post online
Caller ID Spoofing • Gives caller ability to change number shown on ID, change voice, and record call.
16
© 2016 NNEDV
Caller ID Spoofing/Faker
17
© 2016 NNEDV
© 2016 NNEDV
18
© National Network to End Domestic Violence
6
Please do not post online
Fake Incoming Calls
© 2016 NNEDV
19
Truth in Caller ID Act of 2009 • Signed into law Dec. 22, 2010, prohibits caller ID spoofing for the purposes of defrauding or otherwise causing harm. In June 2010, The Federal Communications Commission (FCC) adopted rules implementing the Truth in Caller ID Act. • The FCC’s rules: – Prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value. – Subject violators to a penalty of up to $10,000 for each violation of the rules. – Exempt authorized activities by law enforcement agencies and situations where courts have authorized caller ID manipulation to occur. © 2016 NNEDV
20
Trap Call
• Shows both the name and number of the person. • Can also record all calls without other person knowing. © 2016 NNEDV
© National Network to End Domestic Violence
21
7
Please do not post online
Phone Safety Tips • Document threatening and harassing calls and messages. • Pay‐as‐you‐go phones purchased with cash. • Use virtual phone numbers. – Examples: Google Voice, Burner App, – Be strategic when creating accounts. Linking them to current email accounts or accounts that the abuser knows about may connect identity with new phone number. 22
© 2016 NNEDV
LOCATION © 2016 NNEDV
23
Modern Family
© 2016 NNEDV
© National Network to End Domestic Violence
24
8
Please do not post online
Family Locator Plans • Verizon Family Locator, AT&T Family Map, Sprint Safely Family Locator – Locate a phone/person – Receive updates about arrival/departure – Info accessible online, through an app
© 2016 NNEDV
25
Family Locator Apps • Life 360 Family Locator • Family Tracker • AirCover Family Locator
© 2016 NNEDV
26
Access, Notification & Removal Access • Authorized user on the carrier account. • Often requires physical access to the phone. Notification • Some service sends text notification at the beginning, some sends notice periodically. • May need to install an app and have location turned on. Removing the service • Often need to be an authorized account holder. • Sometimes you can simply delete the app. © 2016 NNEDV
© National Network to End Domestic Violence
27
9
Please do not post online
Social-Based Location Apps • Allows you to connect with friends. – Facebook, Foursquare • Allows you to tell people where you are – Twitter, Instagram • Connect with other people – Meetup – Grindr • Offers deals & discounts – Foursquare © 2016 NNEDV
28
Apps Collect Data Information • Many apps collect location information. • Some need location information to operate but not all. • Assess whether a particular app needs your location information. • Most apps should ask if you will allow it to access your location. If it doesn’t allow you to opt‐out, consider not using that app. © 2016 NNEDV
29
Beware of Accidental Sharing Geotagging • Location can be added to pictures taken with phones. • Some phone apps that connect to social networks must have location access turned on. • Photos uploaded to social media may include exif data. © 2016 NNEDV
© National Network to End Domestic Violence
30
10
Please do not post online
GPS • Global Positioning System (GPS): tracks person/object using satellite technology. – Active vs. Passive.
• Used in: – Cell phones, tablets, laptops. – Vehicle Navigation Systems (On‐Star, Garmin). – Location devices for pets, elderly, children, assets. © 2016 NNEDV
31
Monitor Teen Drivers • Know what time they left, what time they arrived and a map to show you the exact location that the car was parked. • Alerts notify when teen leaves school early, is speeding, or visits friend. • Can set speed limit, unlock doors, enable/disable starter, honk horn.
© 2016 NNEDV
32
GPS Hidden In Cars
© 2016 NNEDV
© National Network to End Domestic Violence
33
11
Please do not post online
Safety Tips • Use strong, unique passwords. • Be aware of what information apps gather. • Log out of accounts that are accessible without passwords. • Be cautious about “jailbreaking” or “rooting” your device. • Some security apps will allow remote “auto‐ wipe,” monitor battery usage, data usage, etc. © 2016 NNEDV
34
Resources • • • •
www.techsafety.org www.nnedv.org/safetynetdocs www.tools.nnedv.org www.womenslaw.org
Safety Net Project, NNEDV
[email protected] © 2016 NNEDV
35
QUESTIONS?
© 2016 NNEDV
© National Network to End Domestic Violence
36
12