SlideShare a Scribd company logo
SECURITY
mobiletelesecz
An experiment in mobile security
 awareness with Bret Seglem.

 Multimedia Senior Thesis Fall
             2 0 11
The mobiletelesecz “Mantra”
You have a tracking device in your pocket.
It knows where you are right now. It knows
who you are friends with. It knows where
you call home. It's your cell phone.
Some Background
Mobiletelesecz began as a guerilla
marketing movement using interactive
installations to stir concern over mobile
privacy.

It has since transformed into a more
conventional campaign to illuminate the
potentials of mobile telephony security
threats to the average user.
Cell phones have been and are
increasingly becoming a major part of
life, but they are not safe from privacy
and security intrusions.

“How do I get the word out?”
The “Device”
I created a “larger than life cell phone like
device” that would include
sensors, cameras, and a microphone to
document people as they passed on the
street. After analyzing the data I would
publish it online to show the results and
spread the mobile security gospel.
The device
built from vinyl
with
sensor/camera.

Informative
cover with QR.
The Pivot
Although a larger than life, data
collecting, model of a phone is a cool idea
with lots of possibilities it strays from my
goal
of generating privacy awareness by in itself
being a privacy breach.

I refocused and decided to concentrate on
creating a public service campaign to
illuminate the security problems facing
mobile users.
The Campaign
The public service campaign will be
designed to bring new light onto concurrent
mobile privacy issues through:

Print/Posters – Stimulate new interest
Flyers/Direct mail – Identify and inform
Social Networking – Bring together and
inform
Online/Banners – Stimulate interest and
inform

More Related Content

What's hot

Ubiquitous
UbiquitousUbiquitous
Ubiquitous
kasey_jun
 
Social Networking 2050
Social Networking 2050Social Networking 2050
Social Networking 2050
ARPUTHA SELVARAJ A
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Graffiti For Smart City Full
Graffiti For Smart City FullGraffiti For Smart City Full
Graffiti For Smart City Full
Mosaico Digitale
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
ANUSUYA T K
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
AnKit Mhatre
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
Likan Patra
 
B & W presentation
B & W presentation B & W presentation
B & W presentation
clowd
 
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskeliaHorisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Teemu Arina
 

What's hot (10)

Ubiquitous
UbiquitousUbiquitous
Ubiquitous
 
Social Networking 2050
Social Networking 2050Social Networking 2050
Social Networking 2050
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Graffiti For Smart City Full
Graffiti For Smart City FullGraffiti For Smart City Full
Graffiti For Smart City Full
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Chap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive ComputingChap1 introduction to Pervasive Computing
Chap1 introduction to Pervasive Computing
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
B & W presentation
B & W presentation B & W presentation
B & W presentation
 
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskeliaHorisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
 

Viewers also liked

B13 intimazione a soprintendenza dopo decreto cd s
B13 intimazione a soprintendenza dopo decreto cd sB13 intimazione a soprintendenza dopo decreto cd s
B13 intimazione a soprintendenza dopo decreto cd s
Marco Grondacci
 
Opinioni Pubbliche - Perché la politica deve inseguire la Rete
Opinioni Pubbliche - Perché la politica deve inseguire la ReteOpinioni Pubbliche - Perché la politica deve inseguire la Rete
Opinioni Pubbliche - Perché la politica deve inseguire la Rete
Dino Amenduni
 
Istanza vas 24 5-014 sospensione sentenza tar liguria
Istanza vas 24 5-014 sospensione sentenza tar liguriaIstanza vas 24 5-014 sospensione sentenza tar liguria
Istanza vas 24 5-014 sospensione sentenza tar liguriaMarco Grondacci
 
Resume (USB)
Resume (USB)Resume (USB)
Resume (USB)
andrew smart
 
English Language Training Programs
English Language Training ProgramsEnglish Language Training Programs
English Language Training Programs
Alexei Kiselev
 
Paku di kepala istri sanusi (gita nuari)
Paku di kepala istri sanusi (gita nuari)Paku di kepala istri sanusi (gita nuari)
Paku di kepala istri sanusi (gita nuari)
Arvinoor Siregar SH MH
 
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009Ben Wildey
 
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
John Blue
 
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגוניתניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
Business Excellence
 
Domenica D'Elia – introduzione BiP-Day 2013
Domenica D'Elia – introduzione BiP-Day 2013Domenica D'Elia – introduzione BiP-Day 2013
Domenica D'Elia – introduzione BiP-Day 2013
eventi-ITBbari
 
Perfect Health - Emotional Eating
Perfect Health - Emotional EatingPerfect Health - Emotional Eating
Perfect Health - Emotional Eating
docvivi
 
Projeto brasil verde
Projeto brasil verde Projeto brasil verde
Projeto brasil verde
Sonia Amaral
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
David Rosenblum
 
Emotional Eating: Making Peace with Food
Emotional Eating: Making Peace with FoodEmotional Eating: Making Peace with Food
Emotional Eating: Making Peace with Food
Dr. DawnElise Snipes ★AllCEUs★ Unlimited Counselor Training
 
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
Netronepos
 
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
John Blue
 

Viewers also liked (17)

B13 intimazione a soprintendenza dopo decreto cd s
B13 intimazione a soprintendenza dopo decreto cd sB13 intimazione a soprintendenza dopo decreto cd s
B13 intimazione a soprintendenza dopo decreto cd s
 
Bai 9
Bai 9Bai 9
Bai 9
 
Opinioni Pubbliche - Perché la politica deve inseguire la Rete
Opinioni Pubbliche - Perché la politica deve inseguire la ReteOpinioni Pubbliche - Perché la politica deve inseguire la Rete
Opinioni Pubbliche - Perché la politica deve inseguire la Rete
 
Istanza vas 24 5-014 sospensione sentenza tar liguria
Istanza vas 24 5-014 sospensione sentenza tar liguriaIstanza vas 24 5-014 sospensione sentenza tar liguria
Istanza vas 24 5-014 sospensione sentenza tar liguria
 
Resume (USB)
Resume (USB)Resume (USB)
Resume (USB)
 
English Language Training Programs
English Language Training ProgramsEnglish Language Training Programs
English Language Training Programs
 
Paku di kepala istri sanusi (gita nuari)
Paku di kepala istri sanusi (gita nuari)Paku di kepala istri sanusi (gita nuari)
Paku di kepala istri sanusi (gita nuari)
 
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009
Certificate IV in Sport (Athlete support services) SRS40406 TAFE Dec 2009
 
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
Dr. Mark Schwartz - Cost Of Mycoplasma Hyopneumoniae In Growing Pigs, Gilts &...
 
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגוניתניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
ניהול משאבי אנוש כמנוף לשיפור והתייעלות ארגונית
 
Domenica D'Elia – introduzione BiP-Day 2013
Domenica D'Elia – introduzione BiP-Day 2013Domenica D'Elia – introduzione BiP-Day 2013
Domenica D'Elia – introduzione BiP-Day 2013
 
Perfect Health - Emotional Eating
Perfect Health - Emotional EatingPerfect Health - Emotional Eating
Perfect Health - Emotional Eating
 
Projeto brasil verde
Projeto brasil verde Projeto brasil verde
Projeto brasil verde
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
 
Emotional Eating: Making Peace with Food
Emotional Eating: Making Peace with FoodEmotional Eating: Making Peace with Food
Emotional Eating: Making Peace with Food
 
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
NETRON provides comprehensive hospitality, bar, cafe and restaurant Point-Of-...
 
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
Dr. Megan Niederwerder - The role of the microbiome in Porcine Reproductive &...
 

Similar to mobiletelesecz - What?

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud
Bridget Kow
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology
Savannah Strategies
 
The sociology of the mobile phone
The sociology of the mobile phoneThe sociology of the mobile phone
The sociology of the mobile phone
BaconBiscuits
 
2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology
Francis Anderson
 
LUON WassUp recap - mar 2014 - 2. the mobile landscape
LUON WassUp recap  - mar 2014 - 2. the mobile landscapeLUON WassUp recap  - mar 2014 - 2. the mobile landscape
LUON WassUp recap - mar 2014 - 2. the mobile landscape
LUON
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital Marketing
Ivan Hernandez
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
Meg Riegel
 
The Big Learn - Mobile Basics
The Big Learn - Mobile BasicsThe Big Learn - Mobile Basics
The Big Learn - Mobile Basics
The Big Learn @ Ogilvy
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
darkwebhackers
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016
Jan Thompson
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
Ericsson
 
Push notifications
Push notificationsPush notifications
Push notifications
SALESmanago AI driven CDXP
 

Similar to mobiletelesecz - What? (20)

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud27 sep today's manager mobile payments_life is more secure in the cloud
27 sep today's manager mobile payments_life is more secure in the cloud
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology2013 Trends :: Consumer : Media : Technology
2013 Trends :: Consumer : Media : Technology
 
The sociology of the mobile phone
The sociology of the mobile phoneThe sociology of the mobile phone
The sociology of the mobile phone
 
2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology2013 Trends - Consumer : Media : Technology
2013 Trends - Consumer : Media : Technology
 
LUON WassUp recap - mar 2014 - 2. the mobile landscape
LUON WassUp recap  - mar 2014 - 2. the mobile landscapeLUON WassUp recap  - mar 2014 - 2. the mobile landscape
LUON WassUp recap - mar 2014 - 2. the mobile landscape
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
The Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital MarketingThe Power of Context and The Future of Digital Marketing
The Power of Context and The Future of Digital Marketing
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
The Big Learn - Mobile Basics
The Big Learn - Mobile BasicsThe Big Learn - Mobile Basics
The Big Learn - Mobile Basics
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
INTERNET
INTERNETINTERNET
INTERNET
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
 
Push notifications
Push notificationsPush notifications
Push notifications
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

mobiletelesecz - What?

  • 1. SECURITY mobiletelesecz An experiment in mobile security awareness with Bret Seglem. Multimedia Senior Thesis Fall 2 0 11
  • 2. The mobiletelesecz “Mantra” You have a tracking device in your pocket. It knows where you are right now. It knows who you are friends with. It knows where you call home. It's your cell phone.
  • 3. Some Background Mobiletelesecz began as a guerilla marketing movement using interactive installations to stir concern over mobile privacy. It has since transformed into a more conventional campaign to illuminate the potentials of mobile telephony security threats to the average user.
  • 4. Cell phones have been and are increasingly becoming a major part of life, but they are not safe from privacy and security intrusions. “How do I get the word out?”
  • 5. The “Device” I created a “larger than life cell phone like device” that would include sensors, cameras, and a microphone to document people as they passed on the street. After analyzing the data I would publish it online to show the results and spread the mobile security gospel.
  • 6. The device built from vinyl with sensor/camera. Informative cover with QR.
  • 7. The Pivot Although a larger than life, data collecting, model of a phone is a cool idea with lots of possibilities it strays from my goal of generating privacy awareness by in itself being a privacy breach. I refocused and decided to concentrate on creating a public service campaign to illuminate the security problems facing mobile users.
  • 8. The Campaign The public service campaign will be designed to bring new light onto concurrent mobile privacy issues through: Print/Posters – Stimulate new interest Flyers/Direct mail – Identify and inform Social Networking – Bring together and inform Online/Banners – Stimulate interest and inform