For example a hunter could identify your friends via social media, use CCTV to identify what bus you take on your commute, and card information that shows you buying a coffee every Friday at the same time in the same shop. While single pieces of information might not always be that helpful, a collection will be. Data is stored by the card provider, and can be accessed by the state with a warrant – or potentially hacked into by a criminal. Even the use of a store points card in a supermarket or coffee shop can give away someone’s location. But all of these methods leave breadcrumbs. Today it’s so easy to pay for things using contactless payments, smart tech pay, and Oyster cards to travel in London. It might also be possible to find out when a fugitive has bought a disguise such as if they have used a card to pay for goods, or Google-searched a shop address first. Even if a fugitive uses a disguise, it’s reported that a walking gait is also unique to a person, so this too can be used for identifying and tracking fugitives. It’s possible to enter a photo of a fugitive’s face into software which will then pick it up when it appears on CCTV. The UK is full of CCTV, with London being one of the most camera-dense cities in the world. In addition to a digital footprint, the hunters on the program will also determine what the fugitives are doing by putting together a pattern using things like CCTV cameras and card payments. So many of these quizzes are designed to prompt people to answer these questions, such as ‘Find out your wrestler name’ – combining your first pet’s name and the street where you grew up. But, it might not even be necessary to research this information, thanks to ever-popular social media quizzes. Online birth records can reveal your date of birth, parents’ names, old addresses and even your mother’s maiden name. It can actually be astonishingly easy to answer these questions thanks to online records. In the event that a hunter or cyber criminal hasn’t been able to find out someone’s passwords, it’s still possible to hack into their accounts by answering security questions. Even if these passwords are no longer correct, many people update them by changing just one digit, so they are remarkably easy to guess. These breaches actually displayed account holders’ credentials including their email address and passwords. The truth is that passwords are increasingly easy to find out, especially due to poor cyber security and historic data breaches at Adobe, LinkedIn and MySpace. After discovering a person’s email address, it can be possible to acquire their password. With this you can find their photograph, which is necessary when tracking fugitives using CCTV.Īnother point to make about social media is that these accounts are all opened using an email address. ![]() Social Mediaįacebook accounts are linked to mobile phone numbers, so as soon as you know someone’s phone number it’s usually possible to find their social media account. This could be created in a range of ways, from regular phone calls or texting, to repeatedly buying top-up credit in specific shops. This means it’s hard but not impossible to find out their home address, work address, the places they’ve visited and even the path they took.īasic burner phones are better but even these can be used to track someone once a pattern has emerged. Smart phones have location services (like Google Maps) on all the time by default, so unless a user actively switches these off, open-source tools – which are accessible to the public – can be used to locate a person’s whereabouts as they move. A person’s digital footprint is the first place to start when tracking someone down or gathering information. Whether it’s checking social media or Google-searching a location, this information is stored, which in effect means it could be accessed. Every time a person uses the internet they leave a breadcrumb. Our increasingly online world is designed to make life easier, but with convenience comes a cost. Tracking Fugitives with their Digital Footprint ![]() Find out more about your online privacy concerns with our insight into TV’s Hunted. In so doing this, we also reveal how a cyber criminal can launch an attack. To illustrate just how real the threat of cybersecurity attacks can be, we take a closer look at how the hunters use technological resources when tracking fugitives. They obtain this information using the latest technology, which sadly, cyber criminals have also been known access. This team, the ‘hunters’, have all sorts of tricks up their sleeve that can reveal an astonishing array of information about the fugitives. The premise of TV’s Hunted is for ten wannabe fugitives to outsmart and escape the grasp of an elite team of ex-military, law enforcement, and security force members. Hunted TV Show: A Cybersecurity Expert’s Insight
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |