Are your phone camera and microphone spying on you?
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
- Access both the front and the back camera.
- Record you at any time the app is in the foreground.
- Take pictures and videos without telling you.
- Upload the pictures and videos without telling you.
- Upload the pictures/videos it takes immediately.
- Run real-time face recognition to detect facial features or expressions.
- Livestream the camera on to the internet.
- Detect if the user is on their phone alone, or watching together with a second person.
- Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
- Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
- Government security agencies like the NSA can also have access to your devices through in-built backdoors. This means that these security agencies can tune in to your phone calls, read your messages, capture pictures of you, stream videos of you, read your emails, steal your files … at any moment they please.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
- Install whatever software/app they like on the user’s device.
- Use a keylogger to grab all of their passwords.
- Steal all documents from the device.
- Take pictures and stream videos from their camera.
- Capture past or live audio from the microphone.
- Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
- You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
more on privacy in this IMS blog
more on surveillance in this IMS blog
Howard, H. A. (2018). Academic Libraries on Social Media: Finding the Students and the Information They Want. Information Technology and Libraries
(1), 8–18. https://doi.org/10.6017/ital.v37i1.10160
In his book Tell Everyone: Why We Share and Why It Matters, Alfred Hermida states, “People are not hooked on YouTube, Twitter or Facebook but on each other. Tools and services come and go; what is constant is our human urge to share.”1 Libraries are places of connection, where people connect with information, technologies, ideas, and each other. As such, libraries look for ways to increase this connection through communication.
Academic libraries have been slow to accept social media as a venue for either promoting their services or academic purposes. A 2007 study of 126 academic librarians found that only 12 percent of those surveyed “identified academic potential or possible benefits” of Facebook while 54 percent saw absolutely no value in social media.2 However, the mission of academic libraries has shifted in the last decade from being a repository of knowledge to being a conduit for information literacy; new roles include being a catalyst for on-campus collaboration and a facilitator for scholarly publication within contemporary academic librarianship.3 Academic librarians have responded to this change, with many now believing that “social media, which empowers libraries to connect with and engage its diverse stakeholder groups, has a vital role to play in moving academic libraries beyond their traditional borders and helping them engage new stakeholder groups.”4
The project focused on three research questions:
1. What social media platforms are students using?
2. What social media platforms do students want the library to use?
3. What kind of content do students want from the library on each of these platforms?
survey using the web-based Qualtrics
The social media platforms included were Facebook, Flickr, G+, Instagram, LinkedIn, Pinterest, Qzone, Renren, Snapchat, Tumblr, Twitter, YouTube, and Yik Yak
The second survey also lasted for three weeks starting in mid-April of the spring 2017 semester. As a participation incentive, students who completed the initial survey and the second survey had an opportunity to enter a drawing for a $25 Visa gift card.
we intend to develop better communication channels, a clear social media presence, and a more cohesive message across the Purdue libraries. Under the direction of our new director of strategic communication, a social media committee was formed with representatives from each of the libraries to contribute content for social media. The committee will consider expanding the Purdue Libraries’ social media presence to communication channels where students have said they are and would like us to be.
Twitter starts showing search results by relevance, not reverse chronological order
more about Twitter in this IMS blog
more on collaboration in education in this IMS blog:
There is a movie about a middle-aged cook, his early-teen son, who TWEETs and VINEs and helps his dad’s career: http://www.imdb.com/title/tt2883512/
Good actors but weak plot and movie. My blog entry is not about the movie quality, but about the notion that social media is saving the main character’s career and helps him self-promote.
This Week in Social Media:
Vine becomes more complex/potent and gets in closer competition with YouTube, Twitter gets in a closer closer competition with Facebook, YouTube becomes more complex, Facebook is further pushing adds in our lives, LinkedIn gets closer with SlideShare
Vine Introduces New Camera: “The new camera offers powerful ways to edit your videos, as well as the ability to import existing videos on your phone and turn them into Vines.”
Twitter Updates Timeline Feed: “Additionally, when we identify a tweet, an account to follow or other content that’s popular or relevant, we may add it to your timeline. This means you will sometimes see tweets from accounts you don’t follow.”
YouTube Updates App: “This YouTube app on TV will make it easier to find what you want through the Guide, and it brings you all the playlists, shelves and branding from channels.”
Facebook Updates Ad Policy: The change increases “the number of times people can see ads from a page in their news feed per day.”
LinkedIn Announces Rollout of Premium Features to All SlideShare Users: “Now, all users will have access to our most popular premium features that include detailed analytics, profile customization and additional upload options, like video and private uploads.”
8 Simple Ways to Get Great Media Exposure
1. Build Your Media Network
2. Leverage Twitter for Pitching
3. Get in Front of Industry Influencers
4. Optimize Your Visual Assets
5. Plan a Series
6. Syndicate Your Blog Content
7. Target International Press
8. Don’t Forget Traditional Media
In addtion to this blog (https://blog.stcloudstate.edu/ims)
and Twitter: @scsutechinstruc
please follow us and let us follow you regrading relevant information in the world of educational technology: