You are on page 1of 23

Game of

Drones
December 4, 2015
Jeff Heckman
Product Manager II IoT/M2M
U. S. Cellular
Jeffrey.Heckman@uscellular.com

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Topic : Game of Drones


Once you leave your house youre in
the public domain.
There are electronic eyes/ears everywhere. Whether
thats good or bad depends on ones point of view.

This session takes a look at some of the nifty


(unsettling?) technologies out there, including
drones, Smart phone/TV, video/audio
surveillance, and their impact on government
and society as a whole.
2

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Wireless Cameras trigger on motion, time of day, etc.


Picture is routed
through internet

4
Camera Transmits
the Picture
Wirelessly
through Cellular
Network

The image is
routed by the
cellular towers

The camera gets


activated with
motion via Passive
Infrared motion
detectors.

1
Password and
Protected
Account
www.smartscouter.com

SmartScouter 5
Servers send pictures
instantaneously to various
devices and email
addresses

Cell Phone

Email

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Application Examples:
Animal Control and monitoring

Utility Industry - copper theft

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Application Examples:
Construction Industry

University of
Madison,
WI Police

Law Enforcement Police, Sheriff Etc.

York County, SC
Sheriff office.
6

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Application Examples:
Dumpsite entry/exit monitoring

Parking Lot

Graffiti monitoring

Non-Wireless meter reading

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Other Wireless Technologies:

Stingrays (Cell site simulators):


Invasive cell phone
surveillance devices that
mimic cell phone towers:

transmitting their locations


and identifying information.

RFID (Radio Frequency Identity)


Tiny computer chips connected to
miniature antennas that can be
placed on or in physical objects.
Used in a wide variety of
applications where contactless
authentication is desired,
including toll booths, transit
passes, passports, and contactless
entry keys.
RFID tags make it possible for
governments, stores, and hackers
to identify people at a distance
and without their knowledge.
Anywhere an RFID reader is
installed, a person can be
identifiedand the more readers
that are installed, the more
precise that tracking can be

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Proximity : Beacons
Pass a beacon in a shop, the
retailer's app (assuming you have
it installed) could display a special
offer alert CUSTOM to you
On a visit to a museum, the
museum's app would provide
information about the closest
display
Slap one on your TV remote, bike,
car, or during game of hide and
seek!
iOS, Mac, Android, Windows
Costs - $5-$10
Battery 1 year+

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Smart TV
How about that Smart TV in
your home?
Not just passive data
Connected to Internet
Send what you watch down
to your own home videos
Record all transactions
(credit card purchases)
Talk sessions (Skype)
Easy to hack no firewalls
10

Samsung Smart TVs


collect data from voice
communications and
even share them with a
third party.

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Facial

Detection Recognition

General surveillance in combination with public/private networked video cameras


Doesnt require the knowledge, consent, or participation of the subject.
State DOT possess high-quality photographs of most citizens that are a natural
source for face recognition programs and could easily be combined with public
surveillance or other cameras in the construction of a comprehensive system of
identification and tracking.
Unlike other tracking methods, such as GPS or RFID, facial recognition does not
require the tracked individual to carry any special device or tag, reducing
consumers ability to thwart unwanted tracking.
3 out of 10 stores now use facial recognition to track customer behavior (sex, race,
age and mood and influence your buying!)
FaceFirst customized databases including 8M entries/law enforcement, or
casino database, or airports, or retail, or
Google:
Map/Street View: face and license plate blurring technology
Applied for patent for a detector that would blur the image of people on portable camera
displays (incorporate into Google Glass for one)

11

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Smart City Lighting - Video/Audio


(gunshot, chemical, spray can, scream, )

12

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Vehicle/Asset/People Tracking
Real Time Tracking
Location,
geofences, engine
stats, driver
behavior (speeding,
idle, fast start,
breaking, etc.)
Instant alerts
Arrival/departure

OBD-II, Hardwire
Snapshot:

13

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

From Mobile device standpoint

Where does the spying come from?


1 - Mobile OS
Its an evolution thing
iOS, Blackberry historically two of the best
Android on par and with Device OEM (Samsung) even better

2 - Device OEM
3 - Applications
4 - MDM Vendor (Mobile Device Management)
Pay very close attention to your IT/IS POLICIES!
MobileIron recently provided a tool in its MDM (Mobile Device
Management) client app that lets users see what IT is
monitoring on their iOS/Android devices

14

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Required
Enterprise
Features

None

Exchange Push Email

Data-at-Rest
Encryption

Device PIN/Wipe

Native MDM Services


Note: Security, Policy
Setting, App Management

Passcode Policies

App Catalog

Configuration APIs
(limited)

2.0

1.0

Cupcake
(1.5)

15

clair
(2.1)

3.0

Froyo
(2.2)

Selective Wipe

Ice Crme
Sandwich

iOS 4
and 5

Android
Supporting
MDM Vendors

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

SAMSUNG
KNOX

My KNOX
Free

KNOX Express
Free
Limited to 10 seats

KNOX Premium
USD$1MSRP
per device/month

Enterprise
Small and medium
business (SMBs)
Government

KNOX Workspace
USD$3.60MSRP
per device/month

Designed For

The mobile professional Small and medium


employee
business (SMBs)

Key Differences

Get secure Microsoft


Quick and simple cloud- Full support for crossEnhanced container
Exchange email on your based set up
platform device policies management with
device in seconds
secure policies

Enterprise
Government

Complementary solution Complementary and


for professional
secure enterprise
employees
mobility solution

Enhanced device
Data encryption every
protection for Samsung time you lock the
devices
container

Find, lock or wipe your Standard support for


device if it goes missing cross-platform
capabilities

Active Directory
integration

No support from IT
required

Easily upgrade to KNOX Application


Premium without losing Management (whitelist
data
and blacklist apps)

Per-app VPN for secure


and fast connection
Support for 2 separate
containers to maximize
productivity

Unlock the full potential


of KNOX Premium with
Add-ons like KNOX
Workspace & KNOX
IAM

16

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Supporting
Android Devices:

Android OS based on Unix and


Linux, and inherently:
provides a stable, reliable and
secure foundation by design
Architected to isolate apps in
virtual containers
Designed for free flowing info
across apps which can lead
to serious security
vulnerabilities and breech of
privacy

While users embrace the great user


experience, they usually dont
understand the potential risks
when downloading an app, users
are informed which permissions the
app requires and are forced to
accept all permissions in order to
use the app.

17

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Applications - Your mobile phone tells all

Spy Stealth

Install on your phone


Dial target phone for 30 sec/pair
Intercept / monitor all activities
Alerts every phone use
Listen 2-way conversation
Turn on microphone, camera
If GPS, know location at all times
Works on all mobile phones

Cost? $27 1-time fee


Others?

mSpy:

YOU install on target phone

Android, iOS, Windows/MAC OS)

1M+ customers, no jailbreak


Geofencing, App control/monitoring
$13-$30/MRC

Infiltrate the computer a person


uses to sync their iPhone (iOS),
BlackBerry, etc.

Spector360
Computer Spy computer monitor:

Record:
Keystrokes
Website visits
Emails, IM, Facebook, Twitter

iOS FlexiSpy, iKeyMonitor


Android Highster Mobile ($70)
All mSpy, PhoneSheriff
(profanity alert, time restrictions,
etc.)

18

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

And finally UAS/V - Unmanned Aerial


Systems/Vehicles (Drones)

19

Beneficial uses, including search-and-rescue missions, AG,


scientific research, mapping, shark protection...
Equipped with facial recognition software, infrared technology, and
speakers capable of monitoring personal conversations...
Tiny drones and drones at high altitudes could go completely
unnoticed while peering into the window of a home or place of
worship and STAY suspended for LONG periods of time!
FAA "recognizes the privacy issues that may be heightened" by
drone surveillance. The FAA also conceded that drones, "because
of their size and capabilities, may enhance privacy concerns," but
the agency has still not begun the process of developing
regulations to safeguard privacy. (Nov. 5, 2015)
FAA expected to issue rules/regs for drones <55 pounds, Q1 2016

Amazon Prime Air deliver packages up to five pounds in 30


minutes or less using small drones to to distances of 10 miles or
more
Other Trials: pizza, groceries, libraries, etc.

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

20

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Drone-on: STATS
Over 4.5K different Drone models
$11B industry by 2024
Over 7.5K small commercial
drones by 2019 in USA alone
Speed 62MPH 150MPH!
Duration hours to indefinite

21

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Wisconsin Drone Privacy Protection Act 4/10/14


Governor Walker signed Senate Bill 196
The law
requires law enforcement agencies to obtain a warrant prior to using a
UAS to collect evidence
prohibits individuals from using a UAS "with the intent to photograph,
record, or otherwise observe another individual in a place or location where
the individual has a reasonable expectation of privacy."

Chicago City Council- 11/18/15

22

The city council approved an ordinance which will ban the drones from flying:
near hospitals, schools and churches.
directly over a person or property without getting permission first.
Park district will set up designated areas where the drones can fly freely.
Penalties:
between $500 and $5,000 for each offense
up to 180 days in jail.

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

Thank You!

23

Contains U.S. Cellular confidential information. Not for external use or disclosure without proper authorization.

You might also like