technologygy trainingg to enhance the safety of … · technologygy trainingg to enhance the safety...
TRANSCRIPT
Technology Training To gy gEnhance the Safety of
Women Youth & ChildrenWomen, Youth & Children
Shabna Ali & Cynthia FraserSafety Net CanadaSafety Net Canada
Ottawa April 23, 2012
National Victims of Crime Awareness Week
Department of Justice Canada
BCSTH NNEDV
Safety Net CanadaSafety Net Canadaa collaboration of…
BCSTH: British Columbia Society of Transition Houses
CIPPIC: Canadian Internet Policy & Public Interest Clinic
NNEDV: National Network to End Domestic Violence’s Safety Net Project
With Support from the Canadian Network of Women’s ppShelters and Transtion Houses (CNWSTH)
Safety Net CanadaSafety Net Canada
Address: how technology impacts victims of Address: how technology impacts victims of domestic & sexual violence, stalking and abuse.
Safety Plan: risks & benefits as technologies evolve Safety Plan: risks & benefits as technologies evolve.
Increase capacity to do survivor‐defined prevention & i t ti& intervention.
Support Survivors: increase accessibility, safety, privacy, self determination, justice, gender equity & human rights.
Why should we talk with Why should we talk with women, youth and children b h l ?about technology use?
Technology Benefits
Web & InternetPhones EmailSocial NetworkingVirtual Worlds
PDAsCaller ID
IM & ChatWireless
Screen ReadersBraille Devices
Texting Faxes
TTY/RelayCameras
Speech SynthesizersMagnifiers, Switches
FaxesVoicemailGPS
CamerasComputersDatabases Magnifiers, SwitchesGPS
RFIDDatabasesBiometrics
… it is constantly evolving !
Perpetrators Misuse Technologyp gy
Interception Impersonation
Tracking Locating
Harassment Stalking
Coercion Threats Stalking
Monitoringl
Threats Spoofing
Environmental Manipulation
Targeting Grooming
Tools, Devices & Networks Evolve, Converge, Merge
Phone Computer
How does this impact safety risks? Finding evidence?
Phone & Computer Voicemailp• Helps document threats by perpetrator
P t t i t t d • Perpetrators intercept and erase messages, even remotely. Guess passwords.
• Where is evidence? Phone or Internet company? • Where is evidence? Phone or Internet company? Number of days saved?
PHONE
INTERNET
Annonymize, Spoof & Record
Perpetrators misuse to impersonate, threaten & stalk
Survivors can use for relocation privacyrelocation privacy
Law: party to call? Consent to record?
Caller ID Spoofing Voice ChangerConsent to record?
Companies accept
Voice Changer Record Live Calls Web Control Panel No Computer Needed.
U C lli C d N bsubpoenas Use Calling Card Number.www.spoofcard.com
Caller ID Unblocking g
Phone Number: Reverse LookupPhone Number: Reverse Lookup
Perpetrators research #s
Caller ID Safety & “Trace”y
Discuss optional Caller ID phone services with victims per call block call block of certain #s victims: per‐call block, call block of certain #s, call trace, etc.
Have agency policies on Caller ID. Test blocked lines used to contact victims.
Buy “generic” (not identified with your agency) phones for some texts & call‐backs to victims.p
Safety & Evidence
Alert survivors that any call might be spoofed OR e t su o s t at a y ca g t be spoo ed Orecorded by an abuser, stalker, impersonator
Inform survivors when it is legal or illegal to record a Inform survivors when it is legal or illegal to record a live conversation
E id Evidence:
Collect evidence to explain faked ‘evidence’ trails from spoofing.
What did the perpetrator use to illegally record call? What did the perpetrator use to illegally record call? Get court order? Keep original evidence if possible.
Optional Phone Service
Unlimited phone numbers
Optional Phone Service
Unlimited phone numbers. Route your Google # to all
‘ l’ h #your ‘real’ phone #. Difficult to track. Anonymous. Has benefits & risks Has benefits & risks
VOIP – Internet PhoneVOIP Internet Phone
Portable (anywhere) or fixed (home, work).( y ) ( , ) 911 less reliable, you can register current
address with VoIP Provider. If Internet goes down, you loose phone. Abusers can misuse it to Spoof calls, unblock Abusers can misuse it to Spoof calls, unblock
blocked #, screen & forward calls, monitor call log & voicemailg
Cordless Phone InterceptionCordless Phone Interception
Can be intercepted by scanners, baby p y , ymonitors, other cordless phones, etc.
May continue to broadcast even if you switch May continue to broadcast even if you switch to a corded phone. Must unplug base unit.
Transmitter range Walk until your cordless Transmitter range: Walk until your cordless phone is out of range? Powerful antennas might intercept your cordless call from even might intercept your cordless call from even further away.
Mobile PhonesPerpetrator might:
l l d l ll Secretly listen to or record live calls Monitor device or online records (password) Sync with Bluetooth & steal data Track the phone’s location Track the phone s location
Cell Phone SIM Card SpyCell Phone SIM Card Spy
Insert SIM card in box. Call # to listen in.
Insert SIM card in Insert SIM card in reader to view, save or edit cell phone files.p
Cell Phone Spywarepy Record & listen to calls, view everything, track location
BluetoothBluetooth
Wirelessly Connect Devices
Risks: Theft of data Hijack your phone or computer.
Safety & Security:
Hijack your phone or computer.
Hide Bluetooth device or turn it off Change default password To permanently unpair, Reset to factory settings
Mobile Phone Safetyy
Safety plan about interception & monitoring: y p p g• Check settings: Bluetooth, GPS, etc.
• Can turn off when not in useCan turn off when not in use
Make sure cell phones used by staff are secured Password protect cell phones secure secured. Password protect cell phones, secure Bluetooth access.
Use safer phone; provide new donated safer phones for victims
Text Messages: Many Ways to Send1. From phone to phone – even to a landline.2. From email, address email to a cell phone number , p
([email protected]).3. Via phone company’s website (either registered or 3 p p y g
anonymous) or text spoofing site.
Only TELUS handsets receive messages from this Telus webpagewebpage
Send Free Texts from Websites
May be limited to certain h i idphone service providers
Block your # in some free i itext services service
“Text Canada may not be d i used to commit any
unlawful act or to misrepresent the identity of misrepresent the identity of the user.”
TigerText Text other TigerText users. Choose Message Lifespan.
Delete on Read. Clear Chat. Group Texts. Send Photo.
Textual & Sexual Harassment
Video: A Thin Line & That’s Not Cool: http://www.youtube.com/watch?v=uBJvCgCYHfg
Youth & Teen TextingYouth & Teen Texting
Without texting many teens say Without texting, many teens say “their social life would be ruined”
Many teenssay they get h d & b lli d i t tharassed & bullied via texts
On average, children get their first cell phone at age 10first cell phone at age 10
Texting Evidence Can Vanish Quickly
Document how the victim feels about the texts. Take screenshots. Or, photograph / video the text
message content. Sometimes texts can be saved on a phone SIM or
Memory card. Phone companies only briefly store text messages.
Police need to send preservation order ASAP. With a court order, law enforcement might get a phone
company to search backup media and retrieve some "d l t d" f h messages "deleted" from a phone.
Texting to SafetyTexting to SafetyMay work in an emergency when voice service doesn’t.
Best Practices: Have safety‐centered policy on texting with survivors Have safety centered policy on texting with survivors Safety Plan around impersonation & fake texts Respond quickly on evidence collection Respond quickly on evidence collection
Summary:y
Alert survivors that any Caller ID, phone conversation i ht t d d i t t d b or message might get recorded or intercepted by a
perpetrator. Safety plan around impersonation Safety plan around impersonation. Address agency / staff use. Put passwords on all
devices and voicemail. devices and voicemail. Contact phone carrier. Add codes to secure online
billing records, etc.g Discuss evidence collection: screenshots, timelimits,
what device and service were used ,“fake” trails. Use a safer phone – new donated phones.