Saturday, February 11, 2012

Cyber Alerts - images

From the FBI:

Map and geocoordinates
Geocoordinates are embedded in the above image, which was transmitted 
via a smartphone. The data make it easy to plot the sender's location on a map. 

 
Cyber Alerts for Parents & Kids

Tip #1: Be Prudent When Posting Images Online

12/22/2011

With the explosive popularity of smartphones and social media platforms, sharing photos has never been easier. Millions of pictures are uploaded to the web every day, and camera-enabled mobile phones are the perennial top-selling consumer electronic devices. So it's a safe bet that even more photos will be cropping up on image-hosting communities and personal websites.

But what exactly is being shared?

In some cases, you might unwittingly be letting others know where you live and work and your travel patterns and habits. These details can be revealed through bits of information embedded in images taken with smartphones and some digital cameras and then shared on public websites. The information, called metadata, often includes the times, dates, and geographical coordinates (latitude and longitude) where images are taken.


mobile phone settings

Disabling the Location Function

Disabling the photo geotagging function on mobile phones varies by manufacturer, but is generally a straightforward process. On one of the most popular models, users can simply navigate to the following folders: 

Settings > General > Location services

The path to location-based services options varies from phone to phone. Users should take special care when enabling or disabling location services (which may include navigation functions), or disabling applications (like photos) accessing the GPS data. Consult your phone manufacturer's guidelines for more information.

While the geospatial data can be helpful in myriad web applications that plot image locations, it also opens a door for criminals, including burglars, stalkers, and predators. It's not a stretch to imagine young teens' images of their ventures to the mall or beach being culled by web predators and meticulously plotted on online maps.

"It's not something we think is happening. We know it's happening," said Kevin Gutfleish, head of the Innocent Images Intelligence Unit in the FBI's Cyber Division. The unit provides analysis and assessments of emerging threats for the operational arm of the Innocent Images National Initiative, which targets child pornography and sexual predators.

"The way that images are being posted in real time allows others who have access to see the metadata and see where the photos were taken and reveal their location at that time," Gutfleish said.

An intelligence analyst in the FBI Criminal Division's Crimes Against Children Unit said these details can reveal a "pattern of life," particularly when images posted over time are clustered in geographic locations.

"It doesn't have to be in real time to be dangerous," said the analyst. "Historical data can tell you a lot about individuals' day-to-day habits and may indicate where they are most likely to be at a certain time."

Some popular social media sites automatically scrub metadata from images before they are published. On the other hand, some leverage the data to display location information beside the images. An amateur sleuth could easily pinpoint a location using the available latitude and longitude coordinates.

"Even if they don't intentionally say where they are, the photos could reveal that," Gutfleish said. "And that could present a potential danger."

Gutfleish said he has seen an increase in intelligence reports and complaints about the potential misuse of the metadata embedded in photos. He said the proliferation of online tools that aggregate personal information from social networking and image hosting sites is enough to urge a level of caution.

He suggests mobile phone users at the very least check the "options" or "settings" on their phones (and any applicable mobile applications) to see if they are sharing location information. In many cases, the default setting is to share location information.

"It's just a best-practice if you don't want to give out your location," Gutfleish says. "We simply want to make sure people know this is happening."

This story is the first in an occasional series aimed at providing practical web advice and tips for parents and their kids.


Sent from my iMickey! 8(; - )
⁰●⁰. ⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰           

Star wars love

From Geek Alerts blog:

10 Geeky Star Wars Things to Bring to the Theater

Star Wars Darth Maul Wallet

Watching Star Wars at the theater is much, much more than pure entertainment. It's also a gathering to unite fans from all walks of life and an opportunity to wear the best Star Wars gear you've got. To mark the occasion of "Star Wars Episode I Phantom Menace" hitting theaters on Feb. 10 in 3D, here are Ten Geeky Star Wars Thingsyou want to be seen with at the show.

First you'll need a place to store your cash and ticket stubs, and what better place than in the Darth Maul Wallet? Darth Maul's piercing eyes and red skin pretty much sum up his personality. Is he the devil's fraternal twin brother? Their resemblance is uncanny.

R2-D2 Back-Buddies Backpack

The wallet is compact and easy to slip in the pocket, but if you're planning to schlep more stuff to the theater it's the R2-D2 Backpack that's going to do the job right. Soft and utilitarian, the pack will serve as a good cushion as well.

Star Wars Darth Vader Lightsaber Umbrella

The weather has been pulling tricks on us lately, having us think Spring is here. If rain is in the forecast for Friday, Star Wars Lightsaber Umbrellas will keep you dry.

Star Wars Darth Vader & Luke Skywalker Lightsaber Tie Clips

Going to the show right after work? Star Wars Lightsaber Tie Clips will keep your tie in place throughout the day and will have you looking forward to what's in store for you at night.

Star Wars by Stride Rite Dueling Lightsaber Lighted Sneakers

Taking the kids along? There's Star Wars gear for them, too. They will want to flaunt Dueling Lightsaber Lighted Sneakers

LEGO Star Wars Watch with Mini Figure Yoda with Interchangeable Parts

Or perhaps they will check the time with a Lego Star Wars Watch with Mini Figure. Darth Maul, Anakin or Yoda? It's hard to decide.

Star Wars R2-D2 Metal Belt Buckle

R2-D2 and C-3PO will be there to cover your arse (or help keep your pants from falling down) when they star as these 3D Metal Belt Buckles.

Star Wars Mints

After all that popcorn and soda you'll finish before the show even starts, you might want to freshen up withStar Wars Mints in your choice of Darth Vader, Stormtrooper, R2-D2 or the Death Star mint shapes and tins.

Yoda In Your Pocket Talking Keychain

Sound effects and catchy dialogue are part of what make Star Wars so epic. While you're waiting in line, you can entertain/annoy people by playing with theYoda in Your Pocket Talking Keychain.

Sexy Slave Princess Leia and Queen Amidala Costumes

Princess Leia ruled the 80s but her hot mamma Amidala gets her own stint in Phantom Menace. Star Wars femme fatales can dress up as the warrior princesses of Star Wars.

May the force be with you as you make your way to the theater to enjoy the show in 3D.


Sent from my iMickey! 8(; - )
⁰●⁰. ⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰           

Skull sugar cubes

Thought if my baby girl. 
From Geek alerts blog:

Skull Sugar Cubes

Skull Sugar Cubes

It's common to hear people say they'd like one or two cubes of sugar added to their coffee or tea. But have you ever heard someone say, "I'll take two skulls, please?" Well, you just might start, because these Skull Sugar Cubes are making their ghoulish way towards cupboards near you. (That is, if you've got some pretty cool friends who love creepy sugar cubes, too.)

Use these Skull Sugar Cubes as you normally would. But save them for special occasions, like themed tea parties, costume parties, or Halloween, because I'm sure they'll be a huge hit with your friends and family.

Skull Sugar Cubes

These ghastly skull sugar cubes are molded by hand in small batches using 100% pure cane sugar.

Make your tea or coffee deadly sweet with these Skull Sugar Cubes, available online from Dembone's shop on Etsy. For $10, you'll get three boxes with five skulls each.

Sent from my iMickey! 8(; - )
⁰●⁰. ⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰           

Life is like coffee

What a great and inspirational video. 
From saving dinner blog:
Welcome Friend,

Do you know people that just seem to be happier in general? Do you say to yourself, "I want to be more like them"? Often, the happiest people in the world don't have the best of everything...they just make the best of everything!


Copyright © 2010 - 2012 flickspire

Watch Life is like Coffee


If you like this video clip, I encourage you to Share it with the world and join me on my mission to empower and inspire millions of people around the globe.

At the end of this video you'll see simple instructions on how you can help.

Together we can spread words of Encouragement, Inspiration & Empowerment one video at a time... and wouldn't you agree our world could use a little more "Positivity" these days!

Together we can make a difference...
 
Love,
 
Leanne


Sent from my iMickey! 8(; - )
⁰●⁰. ⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰           

Cyber alerts

From the FBI:
Girl at computer
Cyber Alerts for Parents & Kids

Tip #2: Beware of 'Sextortion'

02/10/12

At the beginning of her summer break in June 2005, a 15-year-old Florida girl logged onto her computer and received a startling instant message. The sender, whom the girl didn't know, said he had seen her photo online and that he wanted her to send him pictures—of her in the shower. When the girl didn't comply, the sender showed he knew where she lived and threatened to hurt the girl's sister if she didn't agree to his demands.

Worried and hoping to avoid alarming her parents, the girl sent 10 black-and-white images. When her harasser said they weren't good enough, she sent 10 more, nude and in color. Then he wanted more.


Shadow of a hand on a keyboard

Listen: Special Agent Nickolas Savage discusses "sextortion" and the dangers kids face online. 
Full transcript
 Download (5.3MB)


Don't Let It Happen to You


Here are a few precautions that can keep you from being victimized by "sextortion":

- Don't take for granted that your computer's anti-virus software is a guarantee against intrusions.

- Turn off your computer when you aren't using it.

- Cover your webcam when not in use.

- Don't open attachments without independently verifying that they were sent from someone you know.

- It's okay to be suspicious. If you receive a message with an attachment from your mother at 3 a.m., maybe the message is not really from your mother.

- If your computer has been compromised and you are receiving extortion threats, don't be afraid to talk to your parents or to call law enforcement.

"Once these individuals have pictures, they want more," said Special Agent Nickolas B. Savage, who interviewed the girl after she and her mother contacted authorities. "They are then able to say, 'I want you to do x, y, and z. And if you don't, I'm going to take these photographs, and I'm going to send them to people in your school. I'll send them to your family.'"

Savage, who at the time managed the Innocent Images National Initiative Task Force in the FBI's Orlando office, spent the better part of the next four years chasing the phantoms that had hacked the 15-year-old's computer. The winding path eventually led to two assailants—Patrick Connolly and Ivory Dickerson—who jointly terrorized adolescent girls by compromising their computers, demanding sexual photos or videos, and scouring their social networks. The pair also reached out to the girls' friends—who were duped into downloading malicious software because the e-mails and messages appeared to come from trusted sources.

Connolly and Dickerson, both in prison now, victimized more than 3,800 kids through this "sextortion" technique that duly preyed on kids' innocence about the Internet and their fear of being exposed to their friends and family.

"Oftentimes children are embarrassed, especially thinking they have somehow contributed to their victimization," said Savage, who now helps lead the Strategic Outreach and Initiaitve Section in the Cyber Division. "So fearing they will get in trouble if they report it, they will continue with the victimization and send individuals what they are requesting. What often happens is the victimization never stops."

In this case, some girls were terrorized over a span of as many as seven years. Some attempted suicide. One dropped out of high school because she was always looking over her shoulder.

To uncover the scheme, the FBI cloned one of the victim's computers and carried on a two-year undercover correspondence with the hacker, who turned out to be Connollya British citizen who was at times in Saudi Arabia and Iraq, where he worked as a military contractor and evidently carried out parts of his extortion scheme. The trail also led to North Carolina, where Dickerson was amassing a huge portfolio of pictures and video and secretly recording the webcams of compromised computers. Dickerson was found to have about 230 gigabytes of material, and Connolly had four times that. Dickerson was sentenced in 2007 to 110 years in prison. Three years later, Connolly was sentenced to 30 years.

Have Information on the Case?
Hacker Patrick Connoly used a variety of screen names and e-mail addresses, which are listed below. If you have information regarding the case—there may be other victims—please contact your nearest FBI office or submit a tip online.
Screen Names:
- casperlovesya
- cucumbersn
- 1-1Geo-1-1
- Bigbucks
- billie_wiz
- busted633
- CT Chris CT
- GBreathe
- kamberto3
- kambert0e
- meme816
- Mrfrost20005
- Mythbuster
- Nowammies
- o0ompalo0mpaz
- Onehotguy_101
- only_a_bad_dream_2002
- Quewhiffle
- Stealthisalbum
- xlxl_chris_xlx
- xlxlx_paddy_xlxlx
- yummy_yummy45
E-mail Addresses: 
- mervthemerovingian@yahoo.com
- for.facebook1@hotmail.com
- adj00133@yahoo.com
- hweigfuog@hotmail.com
- xcuse_me_miss@hotmail.com
- yesyes@hotmail.com
- marky@aol.net1


Savage says locking up the hackers was one of the most rewarding moments in his career. But he knows there are more victims, some who may not know their tormentors are off the streets.

"The thing was, a lot of these kids are just some folder somewhere," Savage said, illustrating the cold nature of the crimes and punctuating that once material is posted online it's out there for all. "No name. Just pictures and videos in a folder. I know that there are so many more victims out there that are wondering, 'What ever happened to those guys?' or, 'Do I still need to be afraid?'"

This story is the second in an occasional series aimed at providing practical web advice and tips for parents and their kids.

Resources:

Cyber Alerts for Parents & Kids Tip #1: Be Prudent When Posting Images Online
Innocent Images
Crimes Against Children


Sent from my iMickey! 8(; - )
⁰●⁰. ⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰.⁰●⁰