Upload
adam-varn
View
440
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
© NNEDV© NNEDV
Advocacy, Technology, and Safety
Online Course: Part 1 of 4
Benefits and Risks of Technology
Phone Technology
© NNEDV© NNEDV
Adapted from curriculum by:
The Safety Net Technology Project at the
National Network to End Domestic Violence
Email: [email protected]
Website: www.nnedv.org
© NNEDV© NNEDV
Why do we need to know about technology?
• Survivors use technology.
• Abusers and perpetrators misuse technology.
• We use technology within our agencies and partnerships in ways that can impact confidentiality.
• Public as well as private data can be accessed by abusers and perpetrators.
© NNEDV© NNEDV
Technology is not evil!
• Technology doesn’t create abuse. Rather, misuse of technology as a tactic is old behavior with new tools.
• Technology provides many benefits to programs and can enhance services.
• Survivors can use technology strategically to enhance and maintain their safety.
© NNEDV© NNEDV
Risks
• Many risks exist when using technology. Stalkers can – “Spoof” Caller ID,– Intercept calls and call logs,– Track survivors with social location
applications or GPS tracking devices,– Impersonate survivors on social networking
sites, and– Monitor computer and mobile device usage.
© NNEDV© NNEDV
Learning is Essential
• Thus, it is essential to learn about technology even if the advocate does not have a social networking profile or a smart phone.
• Learn more by– Visiting social networking sites “About Us” and
“Safety” pages,– Reading news stories about new features and legal
cases, and– Talking to people who use the most up to date
technology a co-worker with the newest smart phone or the IT Manager.
© NNEDV© NNEDV
Answering Answering MachinesMachines
PhonePhoneTechnologyTechnology
Caller ID Faxes
Cordless Phones
Cell Phones
Wiretap & Bugs
TTY Machines
SCANNERS
© NNEDV© NNEDV
Caller ID Risks
• Reverse directories give the physical address of a person/place based on the phone number – – www.AnyWho.com.www.AnyWho.com.
• Numbers are always available when calling toll free Numbers are always available when calling toll free numbers (800, 888).numbers (800, 888).
• Can be manipulated Can be manipulated with Spoof Cards & with Spoof Cards & VoIP.VoIP.
© NNEDV© NNEDV
Safety Planning for Caller ID
Use pay-as-you-go phones purchased with cash or a VoIP number (i.e., Skype) that is not location specific.
Optional phone services available: distinctive ring, call trace (*57), per call # blocking (*67), call block of certain #’s (*60), and virtual voicemail.
Best Practices When calling survivors, safety plan around the use of Caller
ID and Blocking. Service providers working from home may want to have
their numbers blocked. Test lines frequently to make sure numbers are
still blocked.
© NNEDV© NNEDV
Fax Machines & eFax
• Transmission shows the number it’s faxed from.
• eFax uses Internet and is susceptible to interception just like email.
• Most machines now store data copies of faxes.
Best Practices: Clear memory. Use Passwords.
Never send confidential information via eFax.
© NNEDV© NNEDV
Cell Phone Safety & Best Practices
Encourage survivors to become familiar with all features of Encourage survivors to become familiar with all features of phone – including Bluetooth.phone – including Bluetooth.
If using cell phones to respond to hotline calls in an area If using cell phones to respond to hotline calls in an area where you still have analog coverage, use sparingly & where you still have analog coverage, use sparingly & avoid identifying details. avoid identifying details.
Look into account/plan for any services that are included Look into account/plan for any services that are included and enabled.and enabled.
Be careful of “gifts” – consider getting new phone.Be careful of “gifts” – consider getting new phone.
Always give location information to 911 in emergencies.Always give location information to 911 in emergencies.
Set Bluetooth to “hidden” and GPS to “911 only”. Set Bluetooth to “hidden” and GPS to “911 only”.
© NNEDV© NNEDV
Text Messaging
• Messages can be falsified, spoofed, or sent anonymously from the carrier’s website or services.
• Nearly all 50 states explicitly include electronic communication in stalking or harassment laws.
• With a valid court order, the carrier MIGHT be able to retrieve messages that were "deleted" from the device or can document that a message was sent from one user to another.
• Law enforcement often takes photographs or video of the phone & text message content.
Evidence:
© NNEDV© NNEDV
13
Evidence & Text Messages
• Text messages are stored in an intermediate message server at the phone company at some point during the transmission.
• However, a message may disappear off the server immediately after the recipient receives it, so it may only be retrievable for a very short time period.
• Servers overwrite older messages and messages marked for deletion. Some carriers offer services to restore archived messages if the customer's phone is lost or stolen, and they may retain messages for an extended period of time to facilitate this service.
© NNEDV© NNEDV
Benefits of Bluetooth
• It's wireless.
• It's inexpensive.
• You don't have to think about it.
• Bluetooth attacks
• Call interception
Risks of Bluetooth
14
© NNEDV© NNEDV
3 Important Phone Settings
1. To protect data and calls:
Bluetooth OFF
2. To protect evidence:
3. To keep location private:
15Text Questions to (904)
624-1807
© NNEDV© NNEDV
Evidence Gathering Suggestions
• Report crimes to law enforcement and follow their instructions for evidence preservation
While waiting for law enforcement,
• Do not turn off phone
• Do not place any calls or send any text messages.
• Disconnect wireless connection by
– Using an RF Phone Bag
– Setting the phone to “airplane mode”
16
© NNEDV© NNEDV
3 Important Settings
1. To protect data and calls:
Bluetooth OFF
2. To protect evidence:
Airplane Mode ON
Wireless OFF
3. To keep location private:
17Text Questions to (904)
624-1807
© NNEDV© NNEDV
Airplane Mode
• Turning on “Airplane Mode” on a mobile phone can protect text messages and call logs from alteration, but it will not protect voicemail messages.
© NNEDV© NNEDV
3 Important Phone Settings
1. To protect data and calls:Bluetooth OFF
2. To protect evidence:Airplane Mode ON
3. To keep location private:Location OFF/ GPS OFF
19Text Questions to (904)
624-1807
© NNEDV© NNEDV
Advocacy, Technology, and Safety
Online Course: Part 2 of 4
Location Technology
© NNEDV© NNEDV
Location, Location, Location
© NNEDV© NNEDV
Global Positioning Systems (GPS)
• Track person/object using satellite technology.
• Active vs. Passive
• Commonly found in:
– Cell phones
– Watches
– Vehicle Navigation Systems
• Small and easily hidden.
• Affordable and readily available.
© NNEDV© NNEDV
Phone Location Services
© NNEDV© NNEDV
24
Social Location Tracking
Double opt-in: Choose to see a friend’s location without agreeing to share your location.
Notification: Text messages or “notification” sent to notify you of your “friends’” locations
Turn location sharing on & off/set to false location: can set as invisible to all or to just one person. Perpetrator could set location at grocery store & go to victim’s home or monitor victim’s “check-ins.”
© NNEDV© NNEDV
Risks of GPS
• Family or shared plans allow abuser to access account and GPS, either without consent or coerced.
• If abuser has access to the phone, GPS can still be activated without victim’s knowledge.
• GPS transmitters can be hidden in vehicles or objects.
• Tracking programs can be set to regularly deliver alerts via text message or email to the abuser.
© NNEDV© NNEDV
Monitor Teen DriversMonitor Teen Drivers • Know what time they left, what time they arrived, and see a map of the exact location where the car was / is parked.
• Alerts can notify you when your teen leaves school early, is speeding, or visits a friend who has been declared off limits.
• With a click of the mouse, you can disable the car’s starter, turn on the dome light or flash the headlights.
© NNEDV© NNEDV
GPS Stalking Cases• Colorado, 2000 – Stalker
placed GPS in ex-wife’s car. Convicted: stalking “electronic surveillance.”
• Ohio, 2004 – Put GPS in ex-wife’s car. Convicted: felony menacing by stalking. Ordered to wear GPS device for 1 year!
• New York, 2009 – Former Giants football player put GPS in girlfriend’s car. Found to be second tracking device he had used.
© NNEDV© NNEDV
Safety Planning for Location Technology
Trust instincts. Trust instincts.
Help to narrow down possible location, times, places.Help to narrow down possible location, times, places.
Learn about phone – Can it be tracked by GPS? Has Learn about phone – Can it be tracked by GPS? Has someone loaded a new program onto the phone? Ask carrier someone loaded a new program onto the phone? Ask carrier about tracking plans on account.about tracking plans on account.
Survivor, police, or mechanic can search the car. Look under Survivor, police, or mechanic can search the car. Look under the hood/seats/bumpers, in the trunk, dashboard, glove box, the hood/seats/bumpers, in the trunk, dashboard, glove box, etc. Consider leaving the car temporarily if still worried.etc. Consider leaving the car temporarily if still worried.
Does the car have OnStar or a Navigation System?Does the car have OnStar or a Navigation System?
Strategize about discovery of device, as well as removal as it Strategize about discovery of device, as well as removal as it could alert abuser to discovery.could alert abuser to discovery.
© NNEDV© NNEDV
3 Important Geolocation Strategies
1. Phone Settings:
Location OFF/ Customize
2. Online Profile Settings:
Location OFF
3. Visit cell phone provider to assist with settings 29
© NNEDV© NNEDV
3 Important Geolocation Strategies
1. Phone Settings:
OFF/ Customize
2. Online Profile Settings:
Location OFF
3. Visit cell phone provider to assist with settings 30
© NNEDV© NNEDV
3 Important Geolocation Strategies
1. Phone Settings:
OFF/ Customize
2. Online Profile Settings:
OFF
3. Visit cell phone provider to assist with settings.
31
© NNEDV© NNEDV
Advocacy, Technology, and Safety
Online Course: Part 3 of 4
Securing Online Activities
© NNEDV© NNEDV
Survivors are online!
Survivors…
• Communicate over email & instant messaging.
• Use searches to find information and support.
• Visit our websites for information about local and national services, legal rights, options, safety planning.
• Connect with others through social networking sites.
• Create and contribute to blogs and online forums to share stories, resources, and support.
• Access online counseling services.
© NNEDV© NNEDV
Emails & Computers
• Emails are not private or confidential.
• Impossible to erase history.
• “Window Washers” have severe limitations.
• Firewalls, anti-virus programs, Spyware detectors offer very limited identification of Spyware.
• Wireless networks are not always secure.
© NNEDV© NNEDV
Safety Planningfor Emails & Computers
Avoid easy passwords that the abuser could guess.
Caution family/friends from sharing addresses when sending or forwarding e-mails – use Bcc.
Never delete emails from computer that may be used as evidence.
Use a “safer computer” when possible.
Never open attachments from unknown sources and be skeptical of requests for information.
Keep virus protections up-to-date & install firewalls.
© NNEDV© NNEDV
Spyware• Records all:
• Keystrokes typed• Websites visited• Emails & instant messages • Details of applications and
windows opened• It can:
• Take snapshots of screen• Restart, shutdown, & logoff
computer• Control the desktop
and mouse• Make computer talk
© NNEDV© NNEDV
Spyware
• Sends info to monitor via email in the form of a detailed “Activity Report” and/or screenshots.
• Operates in “stealth mode”, so difficult to detect.
• Inexpensive ($30 and ) and easy to purchase.
• Spyware can be installed by someone who has physical access to the computer/phone OR by sending an email or Instant Message.
© NNEDV© NNEDV
Safety Planning for Computer Monitoring
Try to use a “safer” computer to avoid spy software and keystroke logging hardware.
Consult computer professional; run computer program to detect spy ware (i.e. SpyBot).
Strategize if spy ware is detected - involve police, don’t want to alert abuser.
Create new account on “safer” computer and only access that account from that computer.
© NNEDV© NNEDV
Online Social Networking
• Hundreds of sites. Each collect and share different types of information.
• Not just for teens! Used by people of all ages.
• Information from social networks are used in legal cases, hiring determinations, and education applications.
• Abusers misuse to impersonate and cause harm.
© NNEDV© NNEDV
40
What are the Risks?
• Your friends’ friends’ friends will be able to see your info and become part of your social circle
• Personal info posted online is not private —like a billboard on a highway
• Predators troll online communities to find victims
• Family, teachers, coworkers, coaches, employers can all access your info
• Other people can post information about you on their own pages – even if your page is private
© NNEDV© NNEDV
CyberstalkingConsiderations
• Social Engineering
• Impersonation and Authentication
• Threats and Invasion of Privacy
• Deletion of Evidence
Text Questions to (904) 624-1807 41
© NNEDV© NNEDV
Sites and problematic behavior
• Public threats on Facebook wall; private threat in instant and private messaging
• Impersonation on all sites
• Retweets on Twitter
• Anonymous harassment on Formspring.me
• Harassment of trafficking victim on Tagged.com
• 3rd party contact: Social Engineering
Text Questions to (904) 624-1807 42
© NNEDV© NNEDV
3 Important SN Strategies
1. To document Social Networking posts
PRINT SCREEN
2. To protect your page:
3. To keep location private:43
Text Questions to (904) 624-1807
© NNEDV© NNEDV
3 Important SN Strategies1. To document Social Networking posts
PRINT SCREEN
2. To protect your page: Super Deactivate Account
3. To keep location private:44
© NNEDV© NNEDV
45
Privacy Settings
• Privacy settings vary on social networking sites.
• Limit access to your posts to friends/ followers/ circles that you know personally and can trust with this information.
• Survivors experiencing stalking via social networking sites should limit profile access to friends only and limit profile information shared.
© NNEDV© NNEDV
3 Important SN Strategies1. To document Social Networking posts
PRINT SCREEN
2. To protect your page:
Deactivate Account
3. To keep location private:
Location:
OFF
46Text Questions to (904)
624-1807
© NNEDV© NNEDV
Safety Considerations for Social Networks
• Is the survivor or her children active on any of these sites including alumni, job search, or online dating sites?
• Has an abuser posted a profile of a survivor without the survivor’s knowledge?
© NNEDV© NNEDV
Advocacy, Technology, and Safety
Online Course: Part 4 of 4
Using and Stalking Log
How Survivors Can Benefit from Technology
© NNEDV© NNEDV
Using an Evidence Log
• Use a journal or a log to document incidents of stalking behavior.
• Using this tool provides helpers such as advocates and law enforcement with a timeline of events and a list of existing evidence.
• Even partial information about the event can be useful as it can help to narrow down the types of technologies being used by the stalker.
© NNEDV© NNEDV
Using a Stalking Log
• Include all information relevant to the event:
– Date and time
– Description
– Witness
– Type of technology used (if known)
– Location
– Saved Evidence (printed email, text message stored on phone, call log, photo)
– Police report number and officer’s name and badge number
© NNEDV© NNEDV
Using an Stalking Log
• Safety plan with survivors around safe storage of this evidence.
• Important questions:
– Will the survivor store hard copies or electronic copies?
– Where will the evidence log and saved evidence be stored?
– Who has access to that storage location?
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
1. If a survivor “friends” with stalker on social location applications, she or he can check-in at a false location like the library or grocery store when meeting with an advocate.
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
2. With Gmail and Facebook, a user can discover when her or his account has been accessed. This is useful in discovering if the account has been accessed in another location or by another person.
Facebook: Account Settings >Security>Active Sessions>Login Approvals, Recoginized Devices, and Active Sessions
Gmail: (Bottom right of screen) Details
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
3. Take control of your webcam.
– If the landline or mobile phone has been compromised, use Skype or other VoIP services.
• When not using,
– Cover laptop web camera with tape.
– Uninstall cameras if never used.
– If possible, disconnect webcam from computer and store when not using.
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
4. Incorporate contact restrictions specifically in Injunction for Protection (IFP). Include in the IFP: no social networking contact, no text messaging, or voicemail contact.
OR
• Communicate with the perp ONLY via text message or email so that threats, visitation order violations, or IFP violations are documented.
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
5. When communicating via text message or email, use a code word, code phrase, or a set exchange of code words or phrases to confirm the sender’s identity.
Example text exchange,
Sender (Caller ID says Mom):
Survivor:
Sender:
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
6. Create an anonymous social networking profile.
– Use an anonymous profile image such as nature scene or cartoon picture.
– Use a name other than your own.
– Use false profile data such as home town and employer or leave profile data blank.
© NNEDV© NNEDV
7 Ways Survivors CanBenefit From Technology
7. Use Google Voice to place phone calls and text message for free without using your own personal cell or home phone number. Visit www.google.com/voice to learn more.
© NNEDV© NNEDV
Next Steps for Advocates
Safety Plan with Survivors about their tech use. Share safety & privacy tips.
Work with law enforcement, community members, & policy makers to hold abusers accountable.
Keep learning about technology benefits & risks.
Visit www.nnedv.org for more information and handouts
© NNEDV© NNEDV
Before Sharing Online
• Although it is vital to get tech safety information to victims, we need to do it in ways that do not give ideas or explicit instructions to abusers.
• Please do NOT post explicit tech information on the web or publish in newsletters that will be posted on websites.
• Visit the NNEDV website: www.nnedv.org/SafetyNet to see what materials and information we have provided online. Or contact Safety Net Team at [email protected] to discuss further.
© NNEDV© NNEDV
The Safety Net Technology Project at the
National Network to End Domestic Violence2001 S Street, NW Suite 400
Washington, DC 20009Phone: 202-543-5566
Website: www.nnedv.org
Email: [email protected]
This contact information is intended for advocates and allies. The project does not have staffing and coverage to take calls directly from victims/survivors.
Advocates are encouraged to contact the Safety Net Tech Team for assistance by phone or email about individual victims (identifying details about the victim are
not needed).