12 research outputs found

    Permission-free Keylogging through Touch Events Eavesdropping on Mobile Devices

    No full text
    Mobile devices are carried by many individuals in the world, which use them to communicate with friends, browse the web, and use different applications depending on their objectives. Normally the devices are equipped with integrated sensors such as accelerometers and magnetometers, through which application developers can obtain the inertial values of the dynamics of the device, and infer different behaviors about what the user is performing. As users type on the touch keyboard with one hand, they also tilt the smartphone to reach the area to be pressed. In this paper, we show that using these zero-permissions sensors it is possible to obtain the area pressed by the user with more than 80% of accuracy in some scenarios. Moreover, correlating subsequent areas related to keyboard keys together, it is also possible to determine the words typed by the user, even for long words. This would help understanding what user are doing, though raising privacy concerns

    Just surveillance?

    Get PDF
    There is little written specifically on the ethics of surveillance. David Lyon has proposed three categories of concern (Lyon 2001), John Kleinig five (Kleinig 2009) and Gary Marx twenty-nine (Marx 1998). However, these categories are rarely defined or defended philosophically and lack any underlying ethical theory. Further, while Lyon, Kleinig, Marx and others have elements in common, each raise issues that the others neglect. I argue that the just war tradition can form a framework by which the ethics of surveillance practices may be judged. This separates out questions of who is conducting surveillance, why they are doing it, whether surveillance is proportionate, whether it is necessary, and what its chances of success are. Questions are also raised regarding the ability to discriminate and the proportionality of the means of surveillance. Thus this framework raises all the questions which should be asked of an ethical approach to surveillance and neglects none. We can also employ the just war tradition to inform the content of the debate. For example, how discrimination is dealt with in war could be instructive as to how it should be employed in surveillance. This tradition thus provides a rich, relevant and long-lived discourse on which to found an ethics of surveillance

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
    corecore