+ All Categories
Home > Documents > WI DGS 15 Presentation - Game of Drones - Heckman

WI DGS 15 Presentation - Game of Drones - Heckman

Date post: 04-Mar-2016
Category:
Upload: erepublic
View: 8 times
Download: 0 times
Share this document with a friend
Description:
WI DGS 15 Presentation - Game of Drones by Jeff Heckman
Popular Tags:

of 23

Transcript
  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

    Game of DronesDecember 4, 2015

    Jeff HeckmanProduct Manager II IoT/M2MU. S. [email protected]

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.2

    Topic : Game of DronesOnce you leave your house youre in the public domain. There are electronic eyes/ears everywhere. Whether thats good or bad depends on ones point of view.

    This session takes a look at some of the nifty (unsettling?) technologies out there, including drones, Smart phone/TV, video/audio surveillance, and their impact on government and society as a whole.

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.3

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.4

    Wireless Cameras trigger on motion, time of day, etc.

    The camera gets activated with

    motion via Passive Infrared motion

    detectors.

    SmartScouterServers send pictures

    instantaneously to various devices and email

    addresses

    The image is routed by the

    cellular towers

    Password and Protected Account

    Cell Phone Email

    Camera Transmits the Picture Wirelessly

    through Cellular Network

    Picture is routed through internet

    1

    2

    3

    4

    5

    www.smartscouter.com

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.5

    Application Examples:Animal Control and monitoring

    Utility Industry - copper theft

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.6

    Application Examples:Construction Industry

    York County, SC Sheriff office.

    University of Madison, WI Police

    Law Enforcement -Police, Sheriff Etc.

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.7

    Application Examples:

    Dumpsite entry/exit monitoring Graffiti monitoring

    Parking Lot Non-Wireless meter reading

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.8

    Other Wireless Technologies: Stingrays (Cell site simulators):

    Invasive cell phone surveillance devices that mimic cell phone towers:

    transmitting their locations and identifying information.

    RFID (Radio Frequency Identity) Tiny computer chips connected to

    miniature antennas that can be placed on or in physical objects.

    Used in a wide variety of applications where contactless authentication is desired, including toll booths, transit passes, passports, and contactless entry keys.

    RFID tags make it possible for governments, stores, and hackers to identify people at a distance and without their knowledge.

    Anywhere an RFID reader is installed, a person can be identifiedand the more readers that are installed, the more precise that tracking can be

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.9

    Proximity : Beacons Pass a beacon in a shop, the

    retailer's app (assuming you have it installed) could display a special offer alert CUSTOM to you

    On a visit to a museum, the museum's app would provide information about the closest display

    Slap one on your TV remote, bike, car, or during game of hide and seek!

    iOS, Mac, Android, Windows Costs - $5-$10 Battery 1 year+

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.10

    Smart TV

    How about that Smart TV in your home? Not just passive data Connected to Internet Send what you watch down

    to your own home videos Record all transactions

    (credit card purchases) Talk sessions (Skype) Easy to hack no firewalls

    Samsung Smart TVs collect data from voice communications and even share them with a third party.

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.11

    Facial Detection Recognition General surveillance in combination with public/private networked video cameras Doesnt require the knowledge, consent, or participation of the subject. State DOT possess high-quality photographs of most citizens that are a natural

    source for face recognition programs and could easily be combined with public surveillance or other cameras in the construction of a comprehensive system of identification and tracking.

    Unlike other tracking methods, such as GPS or RFID, facial recognition does not require the tracked individual to carry any special device or tag, reducing consumers ability to thwart unwanted tracking.

    3 out of 10 stores now use facial recognition to track customer behavior (sex, race, age and mood and influence your buying!)

    FaceFirst customized databases including 8M entries/law enforcement, or casino database, or airports, or retail, or

    Google: Map/Street View: face and license plate blurring technology Applied for patent for a detector that would blur the image of people on portable camera

    displays (incorporate into Google Glass for one)

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.12

    Smart City Lighting - Video/Audio (gunshot, chemical, spray can, scream, )

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.13

    Vehicle/Asset/People Tracking Real Time Tracking

    Location, geofences, engine stats, driver behavior (speeding, idle, fast start, breaking, etc.)

    Instant alerts Arrival/departure

    OBD-II, Hardwire

    Snapshot:

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.14

    1 - Mobile OS Its an evolution thingiOS, Blackberry historically two of the bestAndroid on par and with Device OEM (Samsung) even better

    2 - Device OEM

    3 - Applications

    4 - MDM Vendor (Mobile Device Management) Pay very close attention to your IT/IS POLICIES!

    MobileIron recently provided a tool in its MDM (Mobile Device Management) client app that lets users see what IT is monitoring on their iOS/Android devices

    From Mobile device standpoint Where does the spying come from?

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.15

    Required Enterprise Features

    None

    1.0

    Cupcake (1.5)

    Exchange Push Email

    Device PIN/Wipe

    Passcode Policies

    Configuration APIs (limited)

    Data-at-Rest Encryption

    Selective Wipe

    Native MDM Services

    App Catalog

    Note: Security, Policy Setting, App Management

    2.0 3.0 iOS 4 and 5

    Android Supporting

    MDM Vendorsclair (2.1)

    Froyo (2.2)

    Ice Crme Sandwich

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.16

    SAMSUNGKNOX

    My KNOXFree

    KNOX ExpressFree

    Limited to 10 seats

    KNOX PremiumUSD$1MSRP

    per device/month

    KNOX WorkspaceUSD$3.60MSRPper device/month

    Designed For The mobile professional employee

    Small and medium business (SMBs)

    EnterpriseSmall and medium business (SMBs)Government

    EnterpriseGovernment

    Key Differences Get secure Microsoft Exchange email on your device in seconds

    Quick and simple cloud-based set up

    Full support for cross-platform device policies

    Enhanced container management with secure policies

    Complementary solution for professional employees

    Complementary and secure enterprise mobility solution

    Enhanced device protection for Samsung devices

    Data encryption every time you lock the container

    Find, lock or wipe your device if it goes missing

    Standard support for cross-platform capabilities

    Active Directory integration

    Per-app VPN for secure and fast connection

    No support from IT required

    Easily upgrade to KNOX Premium without losing data

    Application Management (whitelist and blacklist apps)

    Support for 2 separate containers to maximize productivity

    Unlock the full potential of KNOX Premium with Add-ons like KNOX Workspace & KNOX IAM

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.17

    Supporting Android Devices:

    Android OS based on Unix and Linux, and inherently: provides a stable, reliable and

    secure foundation by design Architected to isolate apps in

    virtual containers Designed for free flowing info

    across apps which can lead to serious security vulnerabilities and breech of privacy

    While users embrace the great user experience, they usually dont understand the potential risks when downloading an app, users are informed which permissions the app requires and are forced to accept all permissions in order to use the app.

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.18

    Applications - Your mobile phone tells all

    Spy Stealth Install on your phone Dial target phone for 30 sec/pair Intercept / monitor all activities Alerts every phone use Listen 2-way conversation Turn on microphone, camera If GPS, know location at all times Works on all mobile phones

    Cost? $27 1-time fee

    Others? iOS FlexiSpy, iKeyMonitor Android Highster Mobile ($70) All mSpy, PhoneSheriff

    (profanity alert, time restrictions, etc.)

    mSpy: YOU install on target phone

    Android, iOS, Windows/MAC OS) 1M+ customers, no jailbreak Geofencing, App control/monitoring $13-$30/MRC

    Infiltrate the computer a person uses to sync their iPhone (iOS), BlackBerry, etc.

    Spector360 Computer Spy computer monitor:

    Record: Keystrokes Website visits Emails, IM, Facebook, Twitter

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.19

    And finally UAS/V - Unmanned Aerial Systems/Vehicles (Drones)

    Beneficial uses, including search-and-rescue missions, AG, scientific research, mapping, shark protection...

    Equipped with facial recognition software, infrared technology, and speakers capable of monitoring personal conversations...

    Tiny drones and drones at high altitudes could go completely unnoticed while peering into the window of a home or place of worship and STAY suspended for LONG periods of time!

    FAA "recognizes the privacy issues that may be heightened" by drone surveillance. The FAA also conceded that drones, "because of their size and capabilities, may enhance privacy concerns," but the agency has still not begun the process of developing regulations to safeguard privacy. (Nov. 5, 2015)

    FAA expected to issue rules/regs for drones

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.20

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.21

    Drone-on: STATS Over 4.5K different Drone models $11B industry by 2024 Over 7.5K small commercial

    drones by 2019 in USA alone Speed 62MPH 150MPH! Duration hours to indefinite

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.22

    Chicago City Council- 11/18/15 The city council approved an ordinance which will ban the drones from flying:

    near hospitals, schools and churches. directly over a person or property without getting permission first.

    Park district will set up designated areas where the drones can fly freely. Penalties:

    between $500 and $5,000 for each offense up to 180 days in jail.

    Governor Walker signed Senate Bill 196 The law

    requires law enforcement agencies to obtain a warrant prior to using a UAS to collect evidence

    prohibits individuals from using a UAS "with the intent to photograph, record, or otherwise observe another individual in a place or location where the individual has a reasonable expectation of privacy."

    Wisconsin Drone Privacy Protection Act 4/10/14

  • Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.23

    Thank You!

    Game of DronesDecember 4, 2015Topic : Game of DronesSlide Number 3Slide Number 4Slide Number 5Slide Number 6Slide Number 7Other Wireless Technologies:Proximity : Beacons Smart TVSlide Number 11Smart City Lighting - Video/Audio (gunshot, chemical, spray can, scream, )Vehicle/Asset/People TrackingSlide Number 14Slide Number 15Slide Number 16Supporting Android Devices:Applications - Your mobile phone tells allAnd finally UAS/V - Unmanned Aerial Systems/Vehicles (Drones)Slide Number 20 Drone-on: STATSChicago City Council- 11/18/15Thank You!


Recommended