The CSI Stick: The Threat is Real Jennifer Wilson HTM 304.

Slides:



Advertisements
Similar presentations
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
Advertisements

HOUSE RULES for leaving comments. Don’t give out any personal information, such as where you live, your phone number or address, your school or.
ANTI- BULLYING WEEK CYBER BULLYING 16 – 20 November 2009.
How to keep your kids safe online
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
Aspire Vertical Markets Real Estate Office. Real Estate.
 "Cyber bullying involves the use of information and communication technologies such as , cell phone and pager text messages, instant messaging.
INTERNET SAFETY Elementary Age Children Catherine Horn, M.A., C.A.S. Cos Cob School Psychologist.
Internet Safety Awareness
Internet Devices In a changing world these devices keep us running! In a changing world these devices keep us running!
Trends in computing Rachael Vowden Wildern school
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Safeguarding. Your responsibility Your responsibility.
Internet Safety Portage Department of Public Safety.
Lisa Jolynn Elrod I NTERNET S AFETY MICROSOFT CLIPART.
Cell Phone Etiquette By Demorris McCaskill Caller ID O Use Caller ID to determine whether to answer a call. If it is urgent or you do not risk offending.
Using IChat Instant Messaging Software Dean McKinney Greater St. Albert Catholic Schools January, 2006.
Cyber Bullying A guide for parents understanding the “hidden” bully.
1 Information and Communication Technology Course Code: BTT20 Teacher: Mrs. T. van Biljouw.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Chapter 5 Info Tech. Plug ins & Extensions  What are plug ins?  Applications/Extensions – Google Chrome Store
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Review of Lesson One Material From Start To Finish Review.
Web 2.0. what is it, and what can it do?. Interactive Multimedia (IMM)  Interactive Multimedia are things like programs or websites that allow you to.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CCT355H5 F Presentation: Phishing November Jennifer Li.
Cell Phones World Wide By: Becky Coonrod and Katie Cristiano.
LRC 320 Earl Mitchell & Erica Barnes. Cellular devices have pretty much developed as an necessity for the adult human being. We use cell phones more now.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
INTERNET SAFETY BY: PAYTEN AND MALLORY. TIPS Keep the computer in high-traffic area of your home. Establish limits for which online sites children may.
Introduction to Android
Digital Communication Introduction to Grade 5. What is Digital Communication? Digital Communication is any message passed through digital devices Digital.
Mobile Media and Communications COM 597 Kelly McIvor January 7, 2009.
Digital Communication By: Kimmie LaRich. Digital Communication- is how we communicate with people all over the world Two main ways we communicate are.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Computer Safety Online and Offline By Michelle Noel.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
ELEMENTARY SCHOOL. * Property Pass * Parent/Student Laptop Use Agreement * Laptops are to be returned by May 20, 2016.
(555) Affordable Mobile Site Design & Mobile Marketing Solutions! Local Internet Marketing - For Local Businesses.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Technology Tips and Safety for Parents and Teens.
WELCOME TO SCREEN SHELF. Phone Parts Ireland Phone Parts Ireland is an overview of consumer law in Ireland. It sets out basic rules when you buy goods.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Cerrud, George Gutierrez, Jhohans. What is a cell phone? Is a device that can make and receive telephone calls over a radio link whilst moving around.
Phone closet eliminated Phone system hosted from data center No more maintenance fees or added expenses Reliable call quality from world’s best technology.
Helpinbuy.com as the name suggests, helps you in acquire the phone you desire. It is established with the aim of providing ease to the buyers in making.
Mobile Device Security Management Leyna Belinsky.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
One-to-One Device Presentation Using Technology to Enhance Student Learning.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Cyber and Internet Safety (Parents’ Night)
Section II Terms Emily Stepp.
Knole Computer Group June 2017 The USB Hub.
Information Security.
CHOOSING THE BEST PROCESS AND FORM
Online India (P) Ltd We deal in latest mobile and pc software useful for monitoring and surveillance purpose. Have a look over few of them…
Issues In media studies: Cyberbullying
Appropriate Use of Technology
GPS technology and children. What is GPS? GPS is an abbreviation for Global Positioning System. It is a technology used to identify the position of the.
INTERNET SAFETY RULES! INTERNET SAFETY WEEK!!!.
Nguyen, Tuyet HTM 304 Fall 2007.
Social Media & Cell Phones What RCS Parents Need to Know
Presentation transcript:

The CSI Stick: The Threat is Real Jennifer Wilson HTM 304

Where did this come from? Developed primarily for law enforcement, surveillance, and intelligence operations Available to the public Manufactured by a company called Paraben

What does it do? Plugs in to most Motorola and Samsung cell phones….AND.... more phones will be added shortly including Nokia & LG Connects to the charging port and collects s, instant messages, dialed numbers, texts, and anything else that is stored in the phone’s memory There is no trace in the phone that the information had been comprimised

How does this device change our lives? Anyone can get this device Parents can use it to monitor their children’s activities Your significant other can monitor your activities without you knowing What do you have to hide?

The Rule: For a mere 200 dollars, this device can be purchased through the Paraben web site If your cell phone has sensitive data, do not leave it unattended Now in addition to having your conversation being intercepted through your bluetooth, there is a new threat, and it’s very real.