UPDATE

AS OF JANUARY 1, 2013 - POSTING ON THIS BLOG WILL NO LONGER BE 'DAILY'. SWITCHING TO 'OCCASIONAL' POSTING.

Showing posts with label safety. Show all posts
Showing posts with label safety. Show all posts

Sunday, January 30, 2011

Victims & Abusers: Both Use Technology


By Shannon Proudfoot

Technology has moved to the front lines in the fight against domestic violence.

Advocacy organizations are using increasingly sophisticated high-tech solutions in their efforts to keep victims safe, even as they struggle to keep pace with abusers using technology to control and threaten their victims.

"Worldwide, it's an epidemic," says Alexis A. Moore, an abuse survivor and founder of the California-based victim advocacy group Survivors in Action.

"Perpetrators are changing their information and their manoeuvres. Their road map changes by the hour, where our training and education and awareness programs happen on a yearly basis, if that. Laws take years to develop."

GPS devices on vehicles or cellphones can be used to track a victim's movement without their knowledge and abusers can hack into their victim's online accounts to track e-mails or instant-messages, says Cynthia Fraser, a technology safety specialist with the Washington-based National Network to End Domestic Violence (NNEDV).

Advocates first started hearing about high-tech abuse a decade ago, she says, but it's becoming a bigger problem because the technology is so widely and cheaply available. Even abusers who are not tech-savvy can learn how to stalk their partner with the help of the Internet, Fraser says.
The consequences of leaving a digital trail can be deadly. Fraser recalls one case where an abused woman wrote an e-mail about her plans to leave but didn't empty her computer trash bin after deleting the message. Her abuser found the message and killed her.

Fraser works with Safety Net, a project that focuses on technology and domestic abuse, and she's conducted training in Canada with law enforcement, Crown attorneys and shelter workers. Like other advocates, she's careful about how much detail she provides on this type of abuse and efforts to counter it because she doesn't want to "educate abusers."

"Technology has just added another layer to the complexities of women's safety," says Erin Lee-Todd, executive director of Lanark County Interval House, a shelter near Ottawa. "We just have to move with the times."

In Canada, most shelter websites prominently display warnings to victims that their online activities may be monitored, and many have escape buttons that switch to an innocuous website if someone walks into the room. Telecommunications companies have donated new cellphones and airtime to victims who fear their abusers may be tracking their communication or whereabouts with their regular phone.

E-Services, an online counselling program that allows shelters to provide live chat help to clients, is currently being rolled out across Canada by Shelternet, a Toronto-based organization that provides online resources to shelters and abuse victims.

Like those of many advocacy groups, the E-Services website has detailed instructions for clearing browser histories to help victims cover their online tracks, says project manager Tammy Falovo. But the widespread availability of spyware programs that can grab regular screen shots or log every keystroke on a computer and send the information to an abuser means that's no longer enough, she says.

"What we try to do is remind people that no medium is 100 per cent safe," Falovo says.

Many organizations now advise victims to seek help only on computers located in a safe place such as a public library or workplace, and to create a safe e-mail address they only use on computers the abuser has no access to.

The goal is to educate abused women and their children about the high-tech risks without frightening them even more, says Lee-Todd. But while the methods of abuse and stalking may be changing, she says the underlying motivation remains the same.

"The issues are still about power and control, and they're still rooted in that," she says. "Technology has afforded the opportunity to do that more strategically and often in a more sophisticated way."

For Moore, even a professional background as a high-tech investigator didn't protect her when she left an abusive partner several years ago. He began a campaign of "cyberstalking" that involved cancelling her credit cards, emptying her bank account and destroying her credit rating, she says, and like most intimate partners, he knew all the personal information and passwords that allowed him to do so.

Now a cyberstalking expert and founder of the California-based victim advocacy group Survivors in Action, Moore says some abusers will open e-mail accounts and impersonate their victims to seek information or send out naked photos — real or faked — to embarrass them.

"You can't believe what some of them do," she says.*

ARTICLE HERE

(*EOPC can believe it... )

Saturday, August 14, 2010

Web Attacks Can Find Out Where You Live

Booby Trap Pictures, Images and Photos

Visiting a booby-trapped website, the bogus webpage designed for phishing, means inviting cyber attackers to your home, a hacker turned security researcher has warned.

The attacker exploits the shortcomings in many routers -- the device which forwards data packets to their destinations -- to find out a key identification number that can reveal the victim's whereabout in minutes, noted hacker Samy Kamkar said.

Demonstrating such an attack at the recently concluded Black Hat hacker conference in Las Vegas, Kamkar described how web attacks that begin with making contact with the target (user) can be used to find a person's physical location.

After making contact, the target is convinced to visit a booby-trapped website designed by the attacker. Once the victim clicks the attacker's link, Kamkar showed how the attacker can manipulate geo location data from Google to pinpoint a victim's precise location, the BBC reported.

Many people go online via a router and typically only the computer directly connected to the device can interrogate it for ID information.

However, Kamkar found a way to booby-trap a webpage via a browser so the request for the ID information looks like it is coming from the PC on which that page is being viewed.

He then coupled the ID information, known as a MAC address, with a geo-location feature of the Firefox web browser. This interrogates a Google database created when its cars were carrying out surveys for its Street View service.

This database links Mac addresses of routers with GPS co-ordinates to help locate them.

"This is geo-location gone terrible," said Kamkar during his presentation. "Privacy is dead, people. I'm sorry."

Mikko Hypponen, senior researcher at security firm F Secure, attended the presentation and said it was "very interesting research".

"The thought that someone, somewhere on the net can find where you are is pretty creepy," he said.

"Scenarios where an attack like this would be used would be stalking or targeted attacks against an individual," he added.

"The fact that databases like Google Streetview's Mac-to-Location database or the Skyhook database can be used in these attacks just underlines how much responsibility companies that collect such data have to safeguard it correctly," said Mr Hypponen.

In 2005, Mr Kamkar created a worm that exploited security failings in web browsers to garner more than one million "friends" on the MySpace social network in one day.

Prosecuted for the hacking, Kamkar was given three years' probation and 90 days of community service and paid damages. He was also banned from using the net for personal purposes for an undisclosed amount of time.

Thursday, October 08, 2009

October is National Cyber Security Awareness Month


October marks the sixth annual National Cybersecurity Awareness Month sponsored by the Department of Homeland Security. The theme for National Cybersecurity Awareness Month 2009 is “Our Shared Responsibility” to reinforce the message that all computer users, not just industry and government, have a responsibility to practice good “cyber hygiene” and to protect themselves and their families at home, at work and at school.

Americans can follow a few simple steps to keep themselves safe online. By doing so, you will not only keep your personal assets and information secure but you will also help to improve the overall security of cyberspace.

It is Our Shared Responsibility to stay safe online.

SOURCE