SlideShare a Scribd company logo
1 of 11
SECURITY
mobiletelesecz
An experiment in mobile security
 awareness with Bret Seglem.

 Multimedia Senior Thesis Fall
             2 0 11
The mobiletelesecz “Mantra”
You have a tracking device in your pocket.
It knows where you are right now. It knows
who you are friends with. It knows where
you call home. It's your cell phone.
Some Background
Mobiletelesecz began as a guerilla
marketing movement using interactive
installations to stir concern over mobile
privacy.

It has since transformed into a more
conventional campaign to illuminate the
potentials of mobile telephony security
threats to the average user.
Cell phones have been and are
increasingly becoming a major part of
life, but they are not safe from privacy
and security intrusions.

“How do I get the word out?”
The “Device”
I created a “larger than life cell phone like
device” that would include sensors,
cameras, and a microphone to document
people as they passed on the street. After
analyzing the data I would publish it online
to show the results and spread the mobile
security gospel.
The device
built from vinyl
with
sensor/camera.

Informative
cover with QR.
The device
built from vinyl
with
sensor/camera.

Informative
cover with QR.
A test capture
with the device
in place.
The Pivot
Although a larger than life, data
collecting, model of a phone is a cool idea
with lots of possibilities it strays from my
goal of generating privacy awareness by in
itself being a privacy breach. Also it began
to focus too heavily on surveillance.
I refocused and decided to concentrate on
creating a public service campaign to
illuminate the security problems facing
mobile users.
The Campaign
The public service campaign is designed to
bring new light onto concurrent mobile
privacy issues through:

Print/Posters – Stimulate new interest
Flyers/Direct mail – Identify and inform
Social Networking – Bring together and
inform
Online/Banners – Stimulate interest and
inform

More Related Content

What's hot (8)

Graffiti For Smart City Full
Graffiti For Smart City FullGraffiti For Smart City Full
Graffiti For Smart City Full
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ubiquitous
UbiquitousUbiquitous
Ubiquitous
 
Future Normal: Certified Media
Future Normal: Certified MediaFuture Normal: Certified Media
Future Normal: Certified Media
 
Social Networking 2050
Social Networking 2050Social Networking 2050
Social Networking 2050
 
TKclass mobile trends slides
TKclass mobile trends slidesTKclass mobile trends slides
TKclass mobile trends slides
 
Yuvee press release 2009.2 announcing issuance of a US Patent for a Detachabl...
Yuvee press release 2009.2 announcing issuance of a US Patent for a Detachabl...Yuvee press release 2009.2 announcing issuance of a US Patent for a Detachabl...
Yuvee press release 2009.2 announcing issuance of a US Patent for a Detachabl...
 
Surfing Safe on the Road
Surfing Safe on the RoadSurfing Safe on the Road
Surfing Safe on the Road
 

Viewers also liked

ambitious, creative, positive
ambitious, creative, positiveambitious, creative, positive
ambitious, creative, positiveEljay Feuerman
 
DanielFanella_DissertationSigned
DanielFanella_DissertationSignedDanielFanella_DissertationSigned
DanielFanella_DissertationSignedDaniel Fanella
 
Manualoperador
ManualoperadorManualoperador
Manualoperadorleonardo
 
Desarrollo del razonamiento y la competencia matemática a través del juego d...
Desarrollo del razonamiento  y la competencia matemática a través del juego d...Desarrollo del razonamiento  y la competencia matemática a través del juego d...
Desarrollo del razonamiento y la competencia matemática a través del juego d...1jornadasdeescuelamoderna
 
Ο Σταυρός- το σύμβολο των χριστιανών
Ο Σταυρός- το σύμβολο των χριστιανώνΟ Σταυρός- το σύμβολο των χριστιανών
Ο Σταυρός- το σύμβολο των χριστιανώνstamatiademogianni
 

Viewers also liked (10)

3-1 concept of force
3-1 concept of force3-1 concept of force
3-1 concept of force
 
Gaff tapes inc
Gaff tapes incGaff tapes inc
Gaff tapes inc
 
ambitious, creative, positive
ambitious, creative, positiveambitious, creative, positive
ambitious, creative, positive
 
Pejuang (maria magdalena bhoernomo)
Pejuang (maria magdalena bhoernomo)Pejuang (maria magdalena bhoernomo)
Pejuang (maria magdalena bhoernomo)
 
DanielFanella_DissertationSigned
DanielFanella_DissertationSignedDanielFanella_DissertationSigned
DanielFanella_DissertationSigned
 
Manualoperador
ManualoperadorManualoperador
Manualoperador
 
Desarrollo del razonamiento y la competencia matemática a través del juego d...
Desarrollo del razonamiento  y la competencia matemática a través del juego d...Desarrollo del razonamiento  y la competencia matemática a través del juego d...
Desarrollo del razonamiento y la competencia matemática a través del juego d...
 
Apresentação Cidade sem Mosquito
Apresentação  Cidade sem Mosquito Apresentação  Cidade sem Mosquito
Apresentação Cidade sem Mosquito
 
φύλλο εργασίας
φύλλο εργασίαςφύλλο εργασίας
φύλλο εργασίας
 
Ο Σταυρός- το σύμβολο των χριστιανών
Ο Σταυρός- το σύμβολο των χριστιανώνΟ Σταυρός- το σύμβολο των χριστιανών
Ο Σταυρός- το σύμβολο των χριστιανών
 

Similar to Mobileteleseczabout

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloudBridget Kow
 
LUON WassUp recap - mar 2014 - 2. the mobile landscape
LUON WassUp recap  - mar 2014 - 2. the mobile landscapeLUON WassUp recap  - mar 2014 - 2. the mobile landscape
LUON WassUp recap - mar 2014 - 2. the mobile landscapeLUON
 
2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : TechnologyFrancis Anderson
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : TechnologySavannah Strategies
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputingMeg Riegel
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingIvan Hernandez
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
The sociology of the mobile phone
The sociology of the mobile phoneThe sociology of the mobile phone
The sociology of the mobile phoneBaconBiscuits
 
Discussion PredictionsIf you used a flip phone in the early
Discussion PredictionsIf you used a flip phone in the earlyDiscussion PredictionsIf you used a flip phone in the early
Discussion PredictionsIf you used a flip phone in the earlywiddowsonerica
 

Similar to Mobileteleseczabout (20)

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud
 
LUON WassUp recap - mar 2014 - 2. the mobile landscape
LUON WassUp recap  - mar 2014 - 2. the mobile landscapeLUON WassUp recap  - mar 2014 - 2. the mobile landscape
LUON WassUp recap - mar 2014 - 2. the mobile landscape
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital Marketing
 
The Big Learn - Mobile Basics
The Big Learn - Mobile BasicsThe Big Learn - Mobile Basics
The Big Learn - Mobile Basics
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
The sociology of the mobile phone
The sociology of the mobile phoneThe sociology of the mobile phone
The sociology of the mobile phone
 
Discussion PredictionsIf you used a flip phone in the early
Discussion PredictionsIf you used a flip phone in the earlyDiscussion PredictionsIf you used a flip phone in the early
Discussion PredictionsIf you used a flip phone in the early
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Mobileteleseczabout

  • 1. SECURITY mobiletelesecz An experiment in mobile security awareness with Bret Seglem. Multimedia Senior Thesis Fall 2 0 11
  • 2. The mobiletelesecz “Mantra” You have a tracking device in your pocket. It knows where you are right now. It knows who you are friends with. It knows where you call home. It's your cell phone.
  • 3. Some Background Mobiletelesecz began as a guerilla marketing movement using interactive installations to stir concern over mobile privacy. It has since transformed into a more conventional campaign to illuminate the potentials of mobile telephony security threats to the average user.
  • 4. Cell phones have been and are increasingly becoming a major part of life, but they are not safe from privacy and security intrusions. “How do I get the word out?”
  • 5. The “Device” I created a “larger than life cell phone like device” that would include sensors, cameras, and a microphone to document people as they passed on the street. After analyzing the data I would publish it online to show the results and spread the mobile security gospel.
  • 6. The device built from vinyl with sensor/camera. Informative cover with QR.
  • 7. The device built from vinyl with sensor/camera. Informative cover with QR.
  • 8. A test capture with the device in place.
  • 9. The Pivot Although a larger than life, data collecting, model of a phone is a cool idea with lots of possibilities it strays from my goal of generating privacy awareness by in itself being a privacy breach. Also it began to focus too heavily on surveillance.
  • 10. I refocused and decided to concentrate on creating a public service campaign to illuminate the security problems facing mobile users.
  • 11. The Campaign The public service campaign is designed to bring new light onto concurrent mobile privacy issues through: Print/Posters – Stimulate new interest Flyers/Direct mail – Identify and inform Social Networking – Bring together and inform Online/Banners – Stimulate interest and inform