How the camera on your cellphone can be captured and used to spy on you


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

How the camera on your cellphone can be captured and used to spy on you

  1. 1. Are Today’s Technological Gadgets Spying On Us???
  2. 2. Your Smart Phone Spies On You
  3. 3. The Camera On Your Cellphone Can Be Captured and Used to Spy on You Taxpayer-funded programs have created malware for Android smartphones that can remotely take over your phone's camera and use it to spy on you, according to reports in the Washington Times and PCWorld. According to Christina DesMarais at PC World: They call it "visual malware" dubbed PlaceRaider that uses the phone's camera and other sensors to create three-dimensional models of indoor environments that bad guys could download, study and use to steal "virtual objects" such as financial documents, information on computer monitors, and personal information. Researchers from the U.S. Naval Surface Warfare Center developed the software along with researchers from the school of Informatics and Computing at Indiana University in Bloomington, thanks to a grant from the National Science Foundation.
  4. 4. But PlaceRaider may be the most sophisticated spy technology yet. The report says, “PlaceRaider thus turns an individual's mobile device against him- or herself, creating an advanced surveillance platform capable of reconstructing the user's physical environment for exploration and exploitation.” DesMarais notes that it may be a bit early to worry that your smartphone is surreptitiously creating a 3-D model of your apartment or recording your computer's keystrokes while it sits on your desk. He continued, "Cell phones are now the little snitch in your pocket. Cell phones tell me where you are, what you do, who you talk to, everybody you associate with."
  5. 5. PlaceRaider
  6. 6. Last October, researchers with the U.S. military developed an Android app that creates a 3D map of a phone's surroundings by taking candid photos and collecting orientation data with the phone's accelerometer.
  7. 7. While they can prove phones are capable of doing these kinds of tricks, and even if doing so gives real CRIMINALS IDEAS, the average hacker can’t pull off such shenanigans on his own.” Perhaps the concern should be, not that individual “bad guys” might hack your phone to steal your credit card number, but that the government itself might be collecting your information. As Kade Ellis of Privacy SOS and the ACLU reported, a security expert says that everyone who was at Occupy Wall Street had their cell phone surveyed by the NYPD (NewYork Police Department).
  8. 8. And IF the NYPD or other government agencies spying on you through your cell phone doesn't make you NERVOUS, perhaps Rambam's last comment will: he says that the government is “amateur” compared to big business. “Your privacy today isn't being invaded by big brother -- it's being invaded by big marketer,“ Ref: can-be-captured-and-used-spy-you
  9. 9. What happens when you download an application from Google’s “Play Store” WHY MALICIOUS ???
  10. 10. More than 140 million Android, BlackBerry and Nokia phones may be watching their owner's every move. Software running on 140 million mobile phones is tracking its users actions, from dialing to surfing Malicious Software Turns Your Cell Phone Against You But for now, most users are stuck, unable to even turn off or uninstall the program. "Even where a device is out of contract, there is no off switch to stop the application from gathering data."
  11. 11. You know your phone is smart, but just how smart is it? • Smart enough to sense your every movement. • Smart enough to capture your every word. • Smartphones possess an arsenal of powerful features — including microphones, GPS receivers, accelerometers and Wi-Fi antennas — that are meant to help users communicate and access information, but those very same tools can also be used for spying.
  12. 12. Your Tech Gadgets Are Spying on You! The U.S. government program that allows security officials to spy on people’s Internet activity — confirm what conspiracy theorists have long been foretelling: Big Brother is watching.
  13. 13. How Your Mobile Phone Can Spy On You, Thanks to the FBI The FBI is capable of tracking your cell phone, pinpointing your location, sending you targeted messages, and even reconfiguring the characteristics of your phone. The details of FBI spying, the power of intrusive 21st century government technology, and the extent of state collusion with telecommunications companies have all been exposed in a recent legal battle.
  14. 14. The Government Spying On You Through Your Own Computer’s Webcam Or Microphone • A group that calls itself the Chaos Computer Club prompted a public outcry here recently when it discovered that German state investigators were using spying software capable of turning a computer’s webcam and microphone into a sophisticated surveillance device. • The club …announced last Saturday it had analyzed the hard drives of people who had been investigated and discovered that they were infected with a Trojan horse program that gave the police the ability to log keystrokes, capture screenshots and activate cameras and microphones.
  15. 15. Smart TVs • In December 2012, cybersecurity firm ReVuln discovered a flaw in Samsung's then-newest-generation of smart TVs. • The flaw granted hackers access to viewers' sensitive data, such as viewing history and remote files. It also let hackers spread malware to USB devices attached to TVs. • Luigi Auriemma and Donato Ferrante, co-CEOs of ReVuln, said any device that takes an input from the environment, whether it's using Wi-Fi or some other means, is vulnerable. • It's also interesting to consider that even a device not accessible from the Internet is at risk because it can be attacked from LAN [a local area network] through a compromised PC, or via other attack vectors like USB or Bluetooth.
  16. 16. Facebook works with CIA
  17. 17. CIA Reveals Facebook to be Part of Patriot Act, Zuckerberg Secret Agent
  18. 18. • Facebook was setup by the C.I.A. Try telling that to most people and they laugh at it. People seem to think its a coincidence that Facebook seems to be so intrusive over and over again. Privacy policies that would make anyone scratch their head. I'm not going to beat around the bush with this blog post. Facebook was setup by the C.I.A. as a data mining project to collect as much information on as many people as they could. Not only that but it also has very strong ties to D.A.R.P.A. (Defense Advanced Research Projects Agency) • D.A.R.P.A. are under the dept. of defense. They would be the most cutting edge inventors for the government and military. Super high tech stuff. Things we can't even imagine exist, they play with every day. D.A.R.P.A. is tied into all this as well.
  19. 19. Deputy CIA Director, Christopher Sarinsky speech about Facebook “After years of secretly monitoring the public, we were astounded so many people would willingly publicize where they live, their religious and political views, an alphabetized list of all their friends, personal emails addresses, phone numbers, hundreds of photos of themselves, and even status updates about what they were doing moment to moment. It is truly a dream come true for the CIA.” It’s true about how people socialize and share their daily personal data. CIA uses this advantage plus the applications on Facebook and the features it provides such as “suggested friends” that allows the agency to goes deeper into your network and that they considered it as “It is truly a dream come true for the CIA”.
  20. 20. How FACEBOOK Spies on You
  21. 21. When you are logged in
  22. 22. When you are logged out
  23. 23. Teens Aren’t Safe on Facebook
  24. 24. BOTTOM LINE! • Your Privacy is being invaded – Time to Wake Up!!! • They are watching every single move you make through your Phones, PCs and TV sets. • The spy software in your phones is clever enough to delete any blurred photos or any that are too dark, before beaming them to the bad guys. • The photos could also be used to create a 3D model of a room.
  25. 25. SO WHAT DO WE DO??? • Share as minimum information on such devices as you can. • Keep yourself discreet. • Fight Intelligently – keep the distance from the enemy by keeping distance from its SPIES. • Share the truth with others – save yourself and others • Un-Plug Your Self! Don’t let them Fool you so easily – Some things are still in your hand.
  26. 26. THANK YOU