of 23
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.
Game of DronesDecember 4, 2015
Jeff HeckmanProduct Manager II IoT/M2MU. S. [email protected]
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.2
Topic : Game of DronesOnce you leave your house youre in the public domain. There are electronic eyes/ears everywhere. Whether thats good or bad depends on ones point of view.
This session takes a look at some of the nifty (unsettling?) technologies out there, including drones, Smart phone/TV, video/audio surveillance, and their impact on government and society as a whole.
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.3
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.4
Wireless Cameras trigger on motion, time of day, etc.
The camera gets activated with
motion via Passive Infrared motion
detectors.
SmartScouterServers send pictures
instantaneously to various devices and email
addresses
The image is routed by the
cellular towers
Password and Protected Account
Cell Phone Email
Camera Transmits the Picture Wirelessly
through Cellular Network
Picture is routed through internet
1
2
3
4
5
www.smartscouter.com
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.5
Application Examples:Animal Control and monitoring
Utility Industry - copper theft
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.6
Application Examples:Construction Industry
York County, SC Sheriff office.
University of Madison, WI Police
Law Enforcement -Police, Sheriff Etc.
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.7
Application Examples:
Dumpsite entry/exit monitoring Graffiti monitoring
Parking Lot Non-Wireless meter reading
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.8
Other Wireless Technologies: Stingrays (Cell site simulators):
Invasive cell phone surveillance devices that mimic cell phone towers:
transmitting their locations and identifying information.
RFID (Radio Frequency Identity) Tiny computer chips connected to
miniature antennas that can be placed on or in physical objects.
Used in a wide variety of applications where contactless authentication is desired, including toll booths, transit passes, passports, and contactless entry keys.
RFID tags make it possible for governments, stores, and hackers to identify people at a distance and without their knowledge.
Anywhere an RFID reader is installed, a person can be identifiedand the more readers that are installed, the more precise that tracking can be
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.9
Proximity : Beacons Pass a beacon in a shop, the
retailer's app (assuming you have it installed) could display a special offer alert CUSTOM to you
On a visit to a museum, the museum's app would provide information about the closest display
Slap one on your TV remote, bike, car, or during game of hide and seek!
iOS, Mac, Android, Windows Costs - $5-$10 Battery 1 year+
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.10
Smart TV
How about that Smart TV in your home? Not just passive data Connected to Internet Send what you watch down
to your own home videos Record all transactions
(credit card purchases) Talk sessions (Skype) Easy to hack no firewalls
Samsung Smart TVs collect data from voice communications and even share them with a third party.
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.11
Facial Detection Recognition General surveillance in combination with public/private networked video cameras Doesnt require the knowledge, consent, or participation of the subject. State DOT possess high-quality photographs of most citizens that are a natural
source for face recognition programs and could easily be combined with public surveillance or other cameras in the construction of a comprehensive system of identification and tracking.
Unlike other tracking methods, such as GPS or RFID, facial recognition does not require the tracked individual to carry any special device or tag, reducing consumers ability to thwart unwanted tracking.
3 out of 10 stores now use facial recognition to track customer behavior (sex, race, age and mood and influence your buying!)
FaceFirst customized databases including 8M entries/law enforcement, or casino database, or airports, or retail, or
Google: Map/Street View: face and license plate blurring technology Applied for patent for a detector that would blur the image of people on portable camera
displays (incorporate into Google Glass for one)
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.12
Smart City Lighting - Video/Audio (gunshot, chemical, spray can, scream, )
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.13
Vehicle/Asset/People Tracking Real Time Tracking
Location, geofences, engine stats, driver behavior (speeding, idle, fast start, breaking, etc.)
Instant alerts Arrival/departure
OBD-II, Hardwire
Snapshot:
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.14
1 - Mobile OS Its an evolution thingiOS, Blackberry historically two of the bestAndroid on par and with Device OEM (Samsung) even better
2 - Device OEM
3 - Applications
4 - MDM Vendor (Mobile Device Management) Pay very close attention to your IT/IS POLICIES!
MobileIron recently provided a tool in its MDM (Mobile Device Management) client app that lets users see what IT is monitoring on their iOS/Android devices
From Mobile device standpoint Where does the spying come from?
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.15
Required Enterprise Features
None
1.0
Cupcake (1.5)
Exchange Push Email
Device PIN/Wipe
Passcode Policies
Configuration APIs (limited)
Data-at-Rest Encryption
Selective Wipe
Native MDM Services
App Catalog
Note: Security, Policy Setting, App Management
2.0 3.0 iOS 4 and 5
Android Supporting
MDM Vendorsclair (2.1)
Froyo (2.2)
Ice Crme Sandwich
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.16
SAMSUNGKNOX
My KNOXFree
KNOX ExpressFree
Limited to 10 seats
KNOX PremiumUSD$1MSRP
per device/month
KNOX WorkspaceUSD$3.60MSRPper device/month
Designed For The mobile professional employee
Small and medium business (SMBs)
EnterpriseSmall and medium business (SMBs)Government
EnterpriseGovernment
Key Differences Get secure Microsoft Exchange email on your device in seconds
Quick and simple cloud-based set up
Full support for cross-platform device policies
Enhanced container management with secure policies
Complementary solution for professional employees
Complementary and secure enterprise mobility solution
Enhanced device protection for Samsung devices
Data encryption every time you lock the container
Find, lock or wipe your device if it goes missing
Standard support for cross-platform capabilities
Active Directory integration
Per-app VPN for secure and fast connection
No support from IT required
Easily upgrade to KNOX Premium without losing data
Application Management (whitelist and blacklist apps)
Support for 2 separate containers to maximize productivity
Unlock the full potential of KNOX Premium with Add-ons like KNOX Workspace & KNOX IAM
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.17
Supporting Android Devices:
Android OS based on Unix and Linux, and inherently: provides a stable, reliable and
secure foundation by design Architected to isolate apps in
virtual containers Designed for free flowing info
across apps which can lead to serious security vulnerabilities and breech of privacy
While users embrace the great user experience, they usually dont understand the potential risks when downloading an app, users are informed which permissions the app requires and are forced to accept all permissions in order to use the app.
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.18
Applications - Your mobile phone tells all
Spy Stealth Install on your phone Dial target phone for 30 sec/pair Intercept / monitor all activities Alerts every phone use Listen 2-way conversation Turn on microphone, camera If GPS, know location at all times Works on all mobile phones
Cost? $27 1-time fee
Others? iOS FlexiSpy, iKeyMonitor Android Highster Mobile ($70) All mSpy, PhoneSheriff
(profanity alert, time restrictions, etc.)
mSpy: YOU install on target phone
Android, iOS, Windows/MAC OS) 1M+ customers, no jailbreak Geofencing, App control/monitoring $13-$30/MRC
Infiltrate the computer a person uses to sync their iPhone (iOS), BlackBerry, etc.
Spector360 Computer Spy computer monitor:
Record: Keystrokes Website visits Emails, IM, Facebook, Twitter
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.19
And finally UAS/V - Unmanned Aerial Systems/Vehicles (Drones)
Beneficial uses, including search-and-rescue missions, AG, scientific research, mapping, shark protection...
Equipped with facial recognition software, infrared technology, and speakers capable of monitoring personal conversations...
Tiny drones and drones at high altitudes could go completely unnoticed while peering into the window of a home or place of worship and STAY suspended for LONG periods of time!
FAA "recognizes the privacy issues that may be heightened" by drone surveillance. The FAA also conceded that drones, "because of their size and capabilities, may enhance privacy concerns," but the agency has still not begun the process of developing regulations to safeguard privacy. (Nov. 5, 2015)
FAA expected to issue rules/regs for drones
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.20
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.21
Drone-on: STATS Over 4.5K different Drone models $11B industry by 2024 Over 7.5K small commercial
drones by 2019 in USA alone Speed 62MPH 150MPH! Duration hours to indefinite
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.22
Chicago City Council- 11/18/15 The city council approved an ordinance which will ban the drones from flying:
near hospitals, schools and churches. directly over a person or property without getting permission first.
Park district will set up designated areas where the drones can fly freely. Penalties:
between $500 and $5,000 for each offense up to 180 days in jail.
Governor Walker signed Senate Bill 196 The law
requires law enforcement agencies to obtain a warrant prior to using a UAS to collect evidence
prohibits individuals from using a UAS "with the intent to photograph, record, or otherwise observe another individual in a place or location where the individual has a reasonable expectation of privacy."
Wisconsin Drone Privacy Protection Act 4/10/14
Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.23
Thank You!
Game of DronesDecember 4, 2015Topic : Game of DronesSlide Number 3Slide Number 4Slide Number 5Slide Number 6Slide Number 7Other Wireless Technologies:Proximity : Beacons Smart TVSlide Number 11Smart City Lighting - Video/Audio (gunshot, chemical, spray can, scream, )Vehicle/Asset/People TrackingSlide Number 14Slide Number 15Slide Number 16Supporting Android Devices:Applications - Your mobile phone tells allAnd finally UAS/V - Unmanned Aerial Systems/Vehicles (Drones)Slide Number 20 Drone-on: STATSChicago City Council- 11/18/15Thank You!