Chapter 8

Protection Methods

Abstract

This chapter explains how to protect yourself against spying. General protection methods are covered in each chapter; however, this chapter covers what is not directly discussed in each specific chapter’s technology realm. This chapter wraps up the book as a summary and offers more tips on how to safeguard yourself and your belongings (data) from theft or harm.

Keywords

Identity Theft
Hacking
Tracking
Hardening
Theft
Surveillance
Mitigation
Reconnaissance
Web Camera
Threat
Hacker
Attack

Protect yourself!

As we end this book on how to defend yourself against surveillance and reconnaissance attacks, the best advice up front would be to protect yourself, your data, and your assets. Protect your identity. Today, the world operates on a digital landscape. Wearable technology is the latest buzz word and everyone seems to be connected via their phones, pads, and laptops. Virtually, everyone everywhere is becoming more and more interconnected and sharing data and socializing. Using this medium has become the norm. While the world continues to grow digitally, so does the risk of exposure. As the landscape grows exponentially, so does the threat of those who would, and will, abuse this medium for their own gain. Because this threat is so real, it’s imperative to consider your exposure to it, limit it, and protect against it.
Reconnaissance and surveillance have been practiced for centuries, primarily as a way for militaries to conduct observation of enemy activities and monitor targets to gain strategic advantage. Reconnaissance and surveillance teams would go out to gather information about enemy activities in hopes to find out location information, size, and strength of their targets and/or to place targeting information for incoming strikes. Today, the battlefield is in your digital world, where everything you do can be revealed. Things you do that you believe are secret are saved on files, logs, and storage maintained by service providers. What is at stake? Currently, much is at stake. Your privacy is at stake. Your safety could be at stake. Your identity can be stolen. You can be impacted financially. As the digital landscape grows, so does the threat.
The Internet fueled by search engines, social media, and the ability to retain all that it collects is a digital spy’s goldmine when doing reconnaissance work. Considerably, one of the biggest threats today on the Internet is in the form of search engines and social media. You can virtually learn a person’s history, what they like, their location, and who their friends and family are all with the click of a mouse or a stroke of a keypad.

Be Concerned, not Paranoid!

Another topic to discuss is the need to practice due diligence at every turn and try not to be paranoid. As we close on our studies of what can be done digitally and how you could easily be victimized, the goal was to teach you so that you can prepare, not to make you a paranoid wreck! That being said, the trick is to be aware of the risks.
The threat of digital spying is growing at a rapid rate, generationally, more and more are creating an online footprint. As more people get mobile devices and attach to the public Internet, there are more opportunities for attackers to conduct surveillance on selected targets. Your identity can be stolen. You finances can be impacted. Your safety can be threatened. All of this should concern you and enough so that you practice operating safely on the Internet, in social media sites, and as you use your mobile device.
When we discussed how easily your credit card data could be stolen, this did not mean carry around a stack of cash everywhere you go. That too creates a risk. What exposing you to the risks should do is, train you to minimize them.
Information privacy should be practiced as much as possible. If you want something to remain safe, it’s best not to talk about it, record it, or write it down. If you do so, then you should consider that it could be at risk. This is incredibly difficult to do. There are things that we must simply record and write. As you navigate from place to place, consider that your actions are being recorded as seen in Figure 8.1. You’re on video camera; your actions are logged so how do you keep your information private? To keep your information private, you need to secure it the best way possible.
image
Figure 8.1 Your actions are being viewed.
To secure your actions, your identity, and your privacy, you need to learn general security practices that we will cover in this chapter. Some of them may seem outlandish; however, you be the judge. You can choose to practice some of them, or just use them as suggestions. However, one thing is true; if you become the victim of spying, identity theft or an invasion of privacy, and you’re also impacted financially, you may find yourself reviewing this chapter or perhaps the entire book to learn or re-learn ways to safeguard against such attacks.

General Security and Mitigation Techniques

In general, you need to practice due diligence. In sum, this means that you need to assess and analyze your actions before you take them. This can be as simple as limiting your digital footprint. Do you really need to post pictures of yourself on vacation in the Bahamas to your friends and family on Facebook? Is it really necessary to tweet about everything you do every single day? Assess why you do this and what you are attempting to get out of releasing this information to the public. You can also limit your digital footprint by asking those you spend time with to do the same – limit what they put about you and of you on the Internet. This can be as simple as asking your great Aunt not to post pictures of you to a public forum and explaining why. Explain what is at risk. If you do post data about yourself or others do of you, you can also limit who views this data with specific privacy and security settings available on most social media sites to limit exposure.
Be aware of your surroundings and practice looking at things you normally would not look at; for example, take a look at the amount of camera’s in your local area that are mounted on traffic lights. Assess your path to and from work and look for all of the digital tools that are recording your actions. Be aware of who is around you and who does not fit in, or belong. Is anyone following you? Although this seems to spark a debate about being “paranoid,” can you really afford not to?
In general, open your eyes to the bigger picture and be aware that your actions are recorded at every turn. Things posted online may be taken down but they are stored in an archive and can be retrieved and used at a later date. Be aware of your actions and the actions of others as well as what could be recording and tracking you at every turn. Do you really need to carry your phone with you everywhere you go? If the answer is yes, then be aware that everything you do on it and everywhere you go with it is traceable.

Identity Theft

As we have mentioned, identity theft may be funny in the movies, but not funny when it happens to you in real life (and it can). Identity theft, fraud, and other methods of acquiring and using your personal information against you consist of many legal issues today. When banks lose money and insurance rates rise, it costs individuals money and criminals make a lot of money. Social security accounts are stolen and used, bank fraud takes place, and social media sites can be duplicated to where an attacker can pose and post as you. Your personal identity can be used to impersonate you to gather more information.
You can limit exposure by considering what you post online. You can limit exposure by paying in cash instead of by credit card and use specific credit cards with fraud protection in places that you do not frequently or often visit in order to track fraud if it takes place. Check your statements often, and review for any possible misuse. There are many ways you can change your habits so that you can better protect your most valuable asset: you.
As seen in Figure 8.2, your information can be taken from you without your knowledge – physically and digitally. Ensure that you are aware of your surroundings, keep your valuables secure. Your personal information can be stolen and used against you physically as well as in the digital realm.
image
Figure 8.2 Physical theft of information.
Obviously, due diligence is a general term whereas, more specifically, there are actions you can take to secure yourself from the threat of identity theft:
 Take inventory of your belongings. When was the last time you photocopied what was in your wallet? Are you organized? Do you know what accounts you need to lock down and close if anything was stolen?
 Consider what you store and what can be stolen. If you carry a wallet, do you have ATM receipts and other financial information within it that if stolen could cause an issue? Always remove these items from your wallet or possession and only carry what is absolutely needed.
 Practice general security mitigation by keeping a security mindset. Again, this does not mean “be paranoid,” but develop good habits to ensure that you are safe such as checking to make sure you have all of your belongings when going from place to place.
All of these techniques may not eradicate the threat; however, it minimizes the landscape. Be safe, consider that there are threats in the world, and attempt to safeguard yourself, others you care for, and your personal and private belongings.

Harden Systems

Most technology devices you use can be hardened. This means, locked down, secured, and/or applying a greater depth of security. To cover the basics, remember, in general, you do not want to lose these devices to physical theft. There are things you can do to safeguard the data; however, if it is not backed up, it may be lost forever.
There are general guidelines to “hardening” any systems, software, hardware, or application you use. Most come with details on how to do this; however, some do not. In these cases, most restrictive is always recommended and then open up or loosen these restrictions as needed.
Basic system hardening guidelines are as follows:
 Personal computers (PCs) – In general, you want to secure access. Never leave the computer powered on and open for use. Use strong password protection. This will cover access control. Back up critical data. Use a firewall and an antivirus software. Use anti-spyware protection software. Make sure that the operating system and any applications installed are kept up to date with critical system and security patches. Turn on automatic update to keep the system updated. Do not access websites that seem questionable. Use anti-phishing software, generally installed within the browser itself. Set up an e-mail spam filter and make sure you do not open e-mails from those you do not know. Never give out your personal information by request to those you do not know. Turn on auditing and check your logs often. Turn off your webcam when you are not using it.
 Laptops – All of the same hardening rules apply that were covered in PC hardening; however, you need to make sure you do not lose your laptop and prevent against it being stolen. Never use your laptop in public where someone can shoulder surf your activities.
 Mobile devices – Most if not all of the PC and laptop general hardening rules apply; however, some differences are, if you root or jailbreak a device, make sure you install reputable apps with security certificates to ensure it is not malware. Make sure you do not physically lose your device.
 Webcams – Webcams can be hardened by turning off broadcast on any wireless components so that outsiders cannot attach to your cameras. Make sure that you follow all of the hardening steps provided with the application that comes with the system.
 Wireless systems – Make sure you do not broadcast your Service Set Identifier (SSID). Use strong encryption. Change any default passwords that come with your systems.
 Network hardware – Any network devices you use, you should follow the recommended hardening procedures that come with each system.
 Game consoles – Make sure that you secure your devices following recommended best practices that come with the systems. If you have an external camera such as a Kinect, make sure that you secure it and monitor its use.
In theory, you should use encryption whenever possible. You should encrypt data so that if stolen, it cannot be used. Using strong encryption is recommended since weaker versions can be easily cracked. Encryption can in fact be broken, so always consider that this is not 100% secure whenever you use it.
Passwords should always be used and it’s recommended that you use strong passwords. This means that you should not use dictionary words, things that can be associated with you (kids and pet’s names as an example), or any other easily identifiable information that can be used to guess your credentials. Generally, a password should contain a mixture of letters and numbers, upper and lower case letters, and special characters if possible.

General Reconnaissance and Surveillance

Unfortunately, people are followed. We live in a world where there are good people and there are bad. As we covered in detail over the past series of chapters, the use of technology is designed to provide safety and security; however, it can be manipulated and used in harmful ways. Although difficult to determine, if you are in fact being spied on, it’s ok to call law enforcement if you need to. If someone is physically stalking you or you feel endangered, make sure you take the steps necessary to protect yourself.
General reconnaissance and surveillance protection comes in the form of due diligence also. You should always make sure that you are aware of your surroundings and look for things that look out of place. A great example would be if you see that while driving, a car or van behind you is taking the same path as you but attempting to stay out of view. This can be seen by the vehicle not following directly behind you, but a few cars away. A great way to validate this is to make a turn off your normal path and see if the vehicle still remains behind you. A way to protect yourself may be to drive to a police station nearby and park out front.
This may seem scary but believe it or not, it happens. You may have an ex-spouse or mate tracking you and what you are doing. This is also possible if you are in a current court case with someone and they are attempting to gather information on you and what you are doing. For example, if you go to “happy hour” on a Friday evening and attempt to leave the bar and drive. They (or a private investigator) may be videotaping you for evidence.
Although uncommon, there are those out there who may wish to cause you harm randomly, so the same rules apply. Be aware of your surroundings and look for things that are out of place.
General digital surveillance mitigation is similar, whereas with someone physically following you, what is following you are the cameras. In this case, the best form of mitigation is to attempt to be aware of where the cameras are and avoid them. One may ask, why you would want to avoid cameras and that may be answered by two simple answers: either you want what you do to remain private for good reasons or for bad. It may also be because you are attempting to thwart detection and do not want your actions recorded. Either way, there is little you can do to avoid detection without physically or electronically disrupting the cameras, and avoidance is your best method.

Information Gathering

As we discussed, social engineering is a way to gain unauthorized access to trusted resources. This intrusive behavior is done to penetrate defenses to gain information, data, or line of sight into a target. It’s done to commit fraud or espionage. Another common goal is to gain access to commit identity theft. Other malicious behavior could be to cause harm or disruption. That being said, it is important that you learn to protect yourself and your interests carefully. Before we learn how to mitigate this threat, we should discuss how attackers use social engineering to gather data. Earlier in this book, we used a brief example of how an attacker may use a simple phone call to trick someone into providing trusted information. Other ways attackers violate the sanctity of trust through social engineering and trickery is by doing the following:
 Dumpster diving – Ensure that you do not throw away anything that can be retrieved and used against you. Ensure that all papers are burned, shredded (shredded correctly and cannot be reassembled), or destroyed beyond repair. Ensure that hard disks are erased correctly, systems thrown away have disks removed, phones have subscriber identity module (SIM) chips removed and are erased correctly, and so on. Simply put, do not throw anything away that someone can retrieve and reuse.
 Shoulder surfing – Protect yourself by being aware of your surroundings and covering up your actions so that those nearby cannot glean any information from your actions. Cover your hands while typing in pins, and make sure nobody is behind you when entering sensitive information at a terminal or on a keyboard. Block the wandering eyes that are around you from viewing what you do.
 Phishing – Make sure that when you open e-mails and/or get links to sites that they are legitimate. There are phishing filters that come with most if not all standard web browsers. Validate the site you go to so that you do not give your personal information away.
 Keystroke logger – Although difficult to determine, if you have a logger on your system or phone, there are ways to check the running process on your system to see if anything is running in memory that maps to a keystroke logger. Use anti-malware software to ensure that there is nothing running on your system that can steal your information from you. Physical devices can be installed on your system without your knowledge and out of view, so a physical check of your system periodically make sense, any key fobs or odd looking devices should be questioned.
 Bugging – You can physically check for bugging devices. There are tools available online to help you find bugging devices; however, digitally, running specific anti-malware software should find and remove spying tools fairly quickly.
 Recording – This is difficult to mitigate because there are so many ways to record someone’s activities. For example, if you are in a meeting with someone, you may be recorded by a device in which you cannot see and/or mitigate against. In this case, it’s safe to say that to mitigate, ensure that you do not say anything you want to remain private. Otherwise, you can use the same mitigation techniques as already mentioned for the other attacks listed: due diligence, awareness, software scanning, and anti-malware sweeps should find any recording software present.
To mitigate information gathering in general, attempt to practice restraint when posting, putting information online, or giving information away. The public Internet is a goldmine for those conducting intelligence. When used in non-malicious ways, the Internet can be a source of a lot of information. Researching a homework assignment, locating the best travel path, or getting movie times are all simple examples of what can be done in seconds without having to leave your home or pick up your phone. When used for good reasons, the Internet can prove to be extremely helpful; however, when used for bad reasons, the Internet can be used to gather information to conduct attacks.
Another issue with the Internet is that once you put something on a server such as a blog post, a data file, or other source of data, it could remain there for a long time, possibly forever. Data backups collect data from servers and archive it. Data can also be added without your knowledge. In the world of social media, it’s common for people you connect to and with to, and “post” data such as an old picture of you. It can also be done in real time. For example, a favorite bar you visit frequently can quickly be online news if someone posts about it, tags a picture of you within it, or posts that you are in a group at a certain location. Attackers can use this information to ascertain your habits, favorite frequented places, and many other facts about you.
Data can also be doctored. Pictures can be digitally edited, words can be manipulated, and if someone has stolen your identity and posing (and posting) as you on the Internet, could cause serious issues for you. Information is also added willingly, almost too willingly by many. Social media sites today encourage those who are part of them to post data, connect to others for no reason other than to increase their numbers, and like things you normally wouldn’t ever comment on outside of the digital world.
Without any effort at all, your information can be added to the publically searchable Internet within seconds, stay within it indefinitely, and even if you think you have had it removed, it could still be archived somewhere for retrieval. To add, this does not include the data that can be obtained from globally interconnected devices that can also provide those who seek information a source to get it. Servers cache data as an example to speed up Internet browsing and if this system was hacked, could reveal the browsing habits of an entire community as an example.
We should be concerned as a society that if those who wish to do us harm, need only to first have an Internet connection and second a “will” to be interested in gathering data on you, that’s all it takes is a few clicks of their mouse to obtain it. To mitigate, restraint is the key. Observe others as well, who may put information online about you and attempt to have it removed if you do not want it online.
Physical security is equally important. When at work, take the security policies enforced in your organization seriously. No, do not hold the door open for someone you do not know to let them into your office suite. Yes, it’s great manners; however, there have been dozens if not hundreds of penetration attacks conducted by allowing someone into an office suite by simply holding the door for someone to be nice, they do not need to use the biometrics or card reader and you have just been hacked.
Be aware of your actions. Do not allow someone to dig through your trash. Do not allow someone to watch over your shoulder. You can protect yourself by destroying information such as using a shredder as seen in Figure 8.3.
image
Figure 8.3 Shred all important documents.
Shred or burn important papers you decide to trash and do not leave anything that can be reused. Do not sit somewhere with your back facing an open crowd, and do not do personal or private work on your laptop or phone, mobile device, or pad if you cannot safeguard it from being overseen.
When you are talking to someone on the phone, be aware of your audience. Could you be on conference? Could the phone be tapped? Can the room you’re in be bugged? Don’t believe it can happen? Hopefully, by reading this book and others like it, you can start to realize that yes it does happen and it happens often.
When opening e-mails or receiving texts, take the extra time to perform a seconds worth of due diligence. Check the entire e-mail header, review the domain name in which the e-mail was sent, and validate with a phone call to the originator based on a trusted source (not from the e-mail itself) that this was in fact sent on purpose and not a scam.
Do not openly trust. Since this is tough to do, it’s no question as to why this is one of the biggest attacks performed today and why it’s the most difficult to mitigate. As you can see, there are many ways to mitigate this form of attack but it comes down to not trusting everything you see and hear and trusting everyone you do or do not know. It simply comes down to verifying and validating things and ensuring that they are safe if possible.

Social Engineering

Security is built on the foundation of trust. You can secure your identity, computer, or access to your home, but you do give this information and access to those you trust. As an example, you hold the door for someone because you practice chivalry. Your kindness just thwarted the electronic badge system used to ensure that unauthorized users do not enter a facility. Attackers, hackers, and stalkers all hope that you let your guard down for this exact reason so that they can gain access to a trusted location. The main reason social engineering takes place is because it is easier to gain access to a trusted source by simply manipulating someone who can give you access instead of breaking in through technological means. This is the basic foundation of social engineering.
There are many definitions for social engineering. As we just discussed, manipulating human control in order to gain unauthorized access is one of them. Another could be, using a human to provide needed information to gain access to trusted resources. When considering technology specifically, it can sometimes be defined as malware used to trick a user into providing trusted data. In all of these examples, manipulation and trickery are key words used to define the basic underlying principles of social engineering.
In relation to information gathering, social engineering can be used to gain technical data such as passwords, physical and logical access to resources, and many other pieces of information that could be used to conduct a larger attack. Another example, you trick someone through simple conversation to produce answers you need. For example, I place a call to you from a spoofed phone number that appears to you to be from a trusted source. I then tell you things that relate to you, us, or our conversation so that I can gain your trust. By asking specific questions and getting answers, I may be able to ascertain information from you needed to do another task, such as your account information to get into a personal website or bank account. This can then be leveraged into the digital world by exploiting the gathered information.
It is difficult to mitigate social engineering attacks. It strikes at the very root of how human beings treat each other; defending against social engineering means that you need to be aware of your surroundings, who you are dealing with, and no, you cannot trust everyone you meet or know. In fact, social engineers scout for this overly trusting, gullible behavior in people in order to know who to manipulate and how to manipulate them. They are considered easy targets. An act of kindness could be, in fact, the launch of an attack as seen in Figure 8.4.
image
Figure 8.4 Bypass security biometrics with chivalry.
If you could openly trust everyone and everything, there would be no reason for security. No locks on doors and banks would leave their vaults wide open. The fact is that historically, this is not the case and security grows as an industry exponentially every year. As we have covered, there is a thin line between being overly safe and being paranoid. That does not mean you should not have faith in people and believe that you can trust them; it just means precautions are in order for your benefit and the benefit of your finances, your loved ones, and your safety.
You can remain safe by being aware. Be aware of your surroundings. Who are you talking to, who can be listening?
Are you typing something? Are you being recorded? If you remain aware and vigilant about your own personal security, you will understand how to mitigate social engineering attacks. Do not openly trust those you do not know and think about the actions of those you do.

Mobile Phone Tracking

In previous chapters, we covered how dangerous a phone can be, whether it be an old PSTN-based phone or a new digital mobile phone. Although the chapter focuses on mobile phone attacks, it should be considered that just about every device with network connectivity these days can place you at the scene of the crime. It is also very disturbing that with mobile technology, devices are carried with you and not left in your home, placing you directly at the scene of the crime. That being said, your movements are being tracked and recorded and you should be aware.
When you are tracked with your mobile phone (or device), you are essentially giving your exact geographical position away to your telecommunications carrier. The radio towers that you use to obtain and maintain your signal are also used as reference to your exact position. Global positioning system (GPS) technology also aids in placing your location, which we will discuss further in the chapter. Carriers can also track movement based on technology called location-based services. This technology can be used to help assess specific coordinates as you use your mobile device. We will also discuss this technology further within the chapter.
In this chapter, we will also address how the US government is taking advantage of an outdated law on privacy and technology to track Americans. If you use your mobile phone, it will register its position with cell towers every few minutes, whether the phone is being used or not – and mobile carriers are retaining location data on their customers. As the government collects and uses this data, a record of your movements is being kept without your permission or knowledge. Why is spying on mobile devices so important to understand? If you are a victim, let’s look at what could be at risk:
 View SMS messages – applications can record all SMS activities from the target phone. All sent and received messages can be recorded in an online account, even if the messages are deleted from the mobile phone.
 View call logs – Each call can also be logged by the application that will also be uploaded to your online account. This provides the caller and the time of call.
 Track GPS location – GPS tracking can provide your location at any time and recorded to an online account.
 View photos and videos – All photos and videos taken can be recorded and sent to an online account.
 View contact list – A contact list of phone numbers can also be viewed and sent to an online account.
 Website uniform resource locator logs – This can show which websites are visited and can be sent to an online account.
 Call recording – Your calls and messages can be recorded and retrieved and sent to an online account.
As you can see, with a simple application, your privacy is no longer secure and everything you say and do as well as where you go can be tracked. Pretty scary don’t you think?

Physical Device Tracking

In previous chapters, we covered the fundamentals of tracking and focused on the mobile device that is likely to be your cell phone, although we find ourselves carrying or within devices that can also be tracked such as your car. We carry our cell phone’s everywhere we go that basically gives those with access a clear line of sight into your movement, activities, communications, and more. However, beyond the cell phone, there are many other products, services, devices, and applications we are using that also track our behavior. In this chapter, we will look at not only the mobile phone but also other mobile devices that can be tracked. We will also look at other devices that you may not know can be tracked, such as your vehicle.
Another interesting trend emerging in technology today is the “physical tracking” of items with devices. Other devices exist that help those who are forgetful. New devices are coming to the market that allow you to place trackers on items you would normally misplace, for example, a set of keys. More commonly, tools are being sold to “track your pets” with sensors that although only operate with Bluetooth and can only be tracked so far, some offerings can track you within larger radiuses. Another growing trend is with wearable technology where a new market has opened. This technology will allow tracking and the data collected is used with an application so that you can track your health, track your diet, and track your medical condition. There are many devices on the market today that can be placed on a target to “track” them without their knowledge as well such as the locator seen in Figure 8.5.
image
Figure 8.5 Physical device tracker.
Other physical tracking such as finding a lost phone has been around for some time now; however, the technology has been evolving. By registering a device online, offerings such as Apple’s MobileMe (iCloud) allows for the recovery of a lost or stolen device by tracking it. Our vehicles are now coming equipped from the factory with tracking devices installed in them. LoJack that has been around for years is also another form of an advanced anti-theft device that allows for the tracking and recovery of a stolen car. LoJack can also be used with other devices such as laptops. Surveillance gear to track someone physically is also emerging, such as USB devices that can be placed within a car or on a person (perhaps in a pocketbook) to track movement of an individual without their knowledge.
As you can see, tracking is nothing new and it’s growing at an alarming rate. It’s growing in availability and ease of use. It’s being offered as a service for the forgetful and it is appear as a standard feature in devices everywhere. This goes beyond the tracking being done without your knowledge. Within the chapter we will also make reference to tracking without technology, stalking, etc. however the bulk of this chapter will revolve around the technical tracking devices used to physically bug you with or without your knowledge.
When you are charged with a crime and go through the process of getting fingerprinted, you are put into a database so that you can be tracked. Since fingerprints are unique to an individual, it seems likely that if you are caught after being fingerprinted, you will be found to be a possible target of investigation if your prints show up at another crime scene. Similar to physical human fingerprinting, devices can also leave a unique mark. Device fingerprints can be tracked easily; however, there are ways to secure against them. With technology you need to understand that there are unique characteristics that pinpoint or associate you to a device.
 Username – When you log into a device with a set of credentials (username and password), you are leaving a logical fingerprint logged in a system. You can ensure that you are protected by using strong passwords as well as uncommon usernames. For example, do not use your e-mail address as a username if you do not have to.
 Internet protocol (IP) address – When you use a device that uses transmission control protocol/IP, your IP address leaves a fingerprint that can be tracked. You can spoof an IP address or keep them hidden so that you cannot be tracked. Generally, hackers will launch an attack from an unidentified IP or one that is taken over from another machine so that they cannot be tracked.
 Phone number – Your phone number assigned by your carrier is another logical fingerprint that associates you to your mobile device or location. You can spoof your phone number or dial anonymously so that your information cannot be tracked.
 MAC address – A burned in address that denotes the NIC manufacturer and a unique hex number that leaves a unique fingerprint that maps to a device. You can change your MAC address so that you can avoid detection.
 Serial number – Serial numbers leave a fingerprint that maps something physical or logical to a unique number. You can use a fake serial number in order to bypass detection.
 SIM – Your SIM has a unique fingerprint associated with it. Never give your personal information out to those who may ask for it claiming to be from your carrier. They can have your service turned off and use your information to process calls.
 Barcode – A barcode can be unique and allow tracking of whatever is associated with the barcode. Barcodes can be faked to avoid detection or commit crimes.
As you can see, tracking is done everyday, in many ways so that devices you use, places you go, and things you buy can all be tracked. It is possible that when you leave your home in the morning and go to work, go out to lunch, and then back to work and return home, your entire day and everything you have done can be tracked. The credit cards you used, the calls you made, and the ticket you got on a busy intersection can all be used to track your patterns, your movements, and your ultimate location.
There are also different ways that you can be tracked, some ways are application specific and others are physical device specific. If you access a server to download files, you likely did this via IP-based devices that then connect to another IP-based device. Yes, the addressing can be spoofed; however, this can be easily mitigated if you know what to look for. Also, you need to consider that every movement you make in an application-centric world can be logged that allows system administrators to look through, log, and review activity. If you are at work and visit a questionable website against company policy, it’s likely you can and will be found doing so.
You can also be tracked by wearable technology. Ensure that you practice safety when using these devices and the best mitigation techniques is to first limit your exposure, limit your digital footprint, and, if you do use the technology, take every opportunity to harden it as per the systems guidelines.

Web Camera Tracking

The increased use of mobile devices with cameras, PCs with webcams, and camera systems installed at homes, businesses, and out in the general public are growing at an alarming rate and the threats are growing to expose security issues with them that violate your privacy. In this chapter, we will look at the growing use of this technology, what the technology is capable of, what purposes are served for good and evil, and why we should be concerned.
As we discuss these topics and how they relate to reconnaissance and surveillance, it will become evident that you are now always on camera. We carry one with us everywhere we go. There tends to be a camera located everywhere. Let’s consider this example: you wake up and get ready for work, while in your home you are on camera as your home has an active internal security surveillance system. You check your e-mail before you leave the house on your laptop configured with a webcam. You pack up to leave and grab your mobile phone and tablet and get into your car. Your drive to work roughly passing 10 traffic lights before pulling in and parking in the parking garage. There is video surveillance feeds in the garage. You enter work and each entrance/exit and floor contains surveillance equipment. You dock your work laptop (with integrated webcam) and get to work briefly checking your mobile devices that are directly sitting next to you. Each time you leave your desk to move within the office, you take your phone with you. You leave for lunch and go to mall to eat in the food court with a few friends. The mall has video surveillance feeds. After work, you drive back home (10 traffic lights) and settle in for the evening. After dinner, you decide to load a game on your Microsoft Xbox and join a few friends online to play games. After, you check your social media sites online and Skype with a friend.
We can go on and on but I think you get the picture. You are on camera 24 hours a day and this does not include the government’s ability to pinpoint and track your whereabouts via satellite. This does not include military or law enforcement being able to use satellite tracking. Digital surveillance is here to stay and will probably become more invasive over time so learning how to mitigate threats and be aware of new threats is the key to regaining your privacy.
Make sure that you are aware that webcams can be exploited. Some put a piece of tape over their cameras on their systems if they do not use them. Other’s run anti-malware software to ensure Trojans are not running on their system. Regardless, ensure that you protect against this threat or your private and personal information can be exploited.

Data Capture and Exploitation

Data is everywhere. We leave digital footprints or impressions everywhere we go, and by doing anything online or on a computer system, we leave our mark. Most, if not all, of this activity is traceable and can be tracked, and it is also available for data theft. We can attempt to protect ourselves or operate in a stealth manner; however, it is possible that your actions will be logged, tracked, and proven based on many factors. Digital forensic teams are called into review systems that have been tampered with and/or when data theft has taken place, and there are many tools that can be used to prove certain activity has taken place. Lest we forget, there may also be cameras to prove you were in the vicinity of a target system to prove you were involved. You can remotely access these systems and it can be proven that by a source IP address, you may be involved. Even if it’s spoofed, there are other ways to track this activity.
As we see, data tracking and doing forensic work in the digital domain can prove to be helpful; however, it is not always a guarantee that data can be kept secure. As many security analysts learned in the past decade, all of the security measures in the world did not stop a perpetrator from removing classified information about the US nuclear weaponry with a thumb drive. While working as a security analyst, you may be asked to investigate data loss or theft. Data loss prevention is the activity where you or your business entity does whatever possible to safeguard from data leakage or theft. With data everywhere, safeguarding it is a considerable challenge. Data leakage, loss, or theft causes one major problem – it is no longer secure or secret.
Data theft is also a problem that is considerably getting worse. As mobile devices are stolen, data is taken on thumb drives or websites are hacked and credentials are leaked; more and more attackers are able to spy on those they target or find targets through the data they acquire. This data can have confidential information such as passwords to financial accounts, pictures of loved ones that can also become targets, and/or medical information you wish to keep secret.
Data theft can happen in many ways. Physically, a pocketbook or wallet can be stolen. Your phone or mobile device can be taken. Your laptop can be stolen. The data could be with a service provider and they could potentially become a target inadvertently making you the next target. So why is this such an issue when it comes to protecting your assets from surveillance, becoming a target and/or victim? Your data if not protected can be used against you. For example, if your mobile device is lost or stolen and the attacker gains access, they can pose as you which is identity theft. They have access to your private information that can be used to launch a series of attacks against you and those you know.
Due diligence should be done in an effort to protect against becoming a target such as using encryption on your data so that if it is accessed, it cannot be used. Password protection allows those who gain access to a device to be challenged that may dissuade them from attempting to steal your data; however, if your password protection is not strong, it can easily be hacked. When considering surveillance, never store data that can be used against you with protecting it. It is up to you to protect against a data breach to ensure that your data is safe and secure.
Make sure that you safeguard your belongings. Ensure that you use credit or debit cards safely. Protect your data at rest with encryption and protect access. Protect your data in motion with encryption.

General security tips

Final tips for securing yourself and your data - Be Aware of Everything (spam, scams, things out of place). Harden your identity protection, your systems, and your devices. Never misplace things and prepare to misplace them by limiting the data on them and securing them so that they cannot be used against you. Keep your eyes open and be aware.
Look around.
Protect yourself.
Be vigilant.

Summary

To conclude, we have covered a lot in this book – from digital surveillance and reconnaissance to covert operations, malware attacks, webcam breaches, and much more. Without thinking too deeply about it, we may find ourselves at constant risk of being tracked, violated, and victims of identity theft and other malicious attacks.
Legally, we are just touching the tip of the iceberg as case law for cyber law-related crimes surface more and more. In this book, we attempted to discuss some of the more relevant cases; however, there are many out there to review and learn from.
We have discussed the fundamentals of digital surveillance, what reconnaissance is, and what digital spying is. While discussing the history of digital spying, we looked at how government entities, militaries, and others have been practicing for decades to gain tactical advantage and gather intelligence. While discussing these topics, we covered major legislature put in place to provide privacy to those under the fourth amendment as an example.
Unfortunately, we cannot isolate ourselves from living, and doing so carefully and with due diligence will keep us safe; however, the method of attack and the growing landscape expanding the attack vector puts everyone at risk. By practicing safe security practices such as being aware of your surroundings, being careful about leaving or losing devices or other personal information, and checking to see if your systems are free and clear of malware are all good ways to be safe.
Information gathering will take place; however, it’s up to us to limit the amount of information that can be gathered. Stalkers gather information on targets, government agencies collect information on the public, their adversaries, and military targets, and corporate gather information on their competition – it is undeniable that this practice will not stop and we as security analysts must remain vigilant in our attempts to secure, safeguard, and stay on top of the latest threats. – Good luck.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.108.119