Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Photo Safety

You ever watch CSI or NCIS? In one episode there was a missing girl that they needed to find, but all they had to go on was a single photo. They zoomed in on her eye and in the reflection of her eye is the porthole of the boat she was being kept on. A mile away is another boat blocking a roadsign so they digitally move it away so they can see what's behind it.

Of course, they're pushing the limits of fantasy, but there's a lot of truth in it too. I once asked a girl that was selling some furniture to send me a picture. When she did, I looked at the furniture, but also the reflections in the glass where I saw the flash from her camera and her standing in her underwear below that.

While I never told her that I saw her in her underwear, I've told literally thousands of people since then! Unless you want to be in her position of being immortalized forever in a simple mistake, you should learn a little about photo safety.

Backgrounds and Reflections

Here's a nice photo of your house. No worries right?

Well what about your poor neighbor who was minding her business only for you to post a photo of her in the shower.

How about the fact that your state, street, and house number are visible leading them right to your house? Or that the fancy stuff in your garage gives them good reason to target you.

Reflecting street name with house number and state plate visible

Here are several other examples where people didn't pay much attention and ended up embarrassing themselves (WARNING! Adult oriented and probably NSFW).

Screenshots

When creating manuals, help guides, or when looking for help, people post pictures of their screen online, but often don't think about the consequences. Take this example I found in a forum where a guy was asking for help trying to figure out why all his shortcuts looked odd. Of course, this exposes the names of his files, programs, and links. Chances are he didn't want anyone to know just how much he loves the girly twilight phenomenon!

Twilight fan? Really?

Companies don't want hackers to know what operating systems and programs they're using, but a simple screenshot can give that away in seconds. Not only that but many screenshots I've seen have e-mail or calendars open in the background which gives away important dates, names, accounts, etc.

If you can get rid of the sensitive information by cropping out unnecessary parts, do so. Otherwise, you might have to abandon posting the photo at all (unless you're sure there's nothing at all sensitive in the photo).

Reflecto-Porn

I already told you the story of the girl who flashed me without meaning to in her photo. What I didn't tell you yet was how common this actually is! So common that they named it Reflectoporn. Here's one example:

Makes you want to check more carefully before uploading huh?

Meta-Data

If you take a look at this photo, nothing seems wrong. It's a cute girl catching some sun and not much more. Nothing in the background, nothing in the reflections. But what about the EXIF data?

EXIF is a set of data items that are added to a photo and go everywhere the photo goes (it's part of the file). If you put your name into your computer as the user or whenever software asks you, that data could be loaded into the camera and thus the photos.

Example of EXIF data from Flickr

How to know for sure

File properties in Windows

You can check by right-clicking a photo you've taken and clicking on "Properties" then clicking the "Details" tab. Alternatively if you use any real photo editor (not MS Paint) one of the options should be to view and modify EXIF data. Also if you have an account with a photo sharing site like Flickr, you can also just upload a photo there and click the "this photo was taken with [model of camera]" link to see all available data.

But wait. It gets worse. Did you know that some cameras and a LOT of camera phones (iPhones for example) geotag photos? That means that part of the EXIF data is the GPS coordinates where the photo was taken. That allows nifty features like this Google map overlay with tons of persona photos people uploaded pinned to the location they were taken! Neat right?

Photos pinned to where they were taken. Supported with geotagging features.

Why this is bad

So now you can know where any pictures are taken. Remember that photo of the cute girl up there? Maybe some creep decides he'd like to know where she lives and now, with a click or two, he can. Just put the GPS data into Google maps!

What about our soldiers out protecting us the best they can wherever they are. It's kind of important that people not know where they are or the camp they're in or the boat they're on. As soon as someone takes a candid shot and uploads it, they may give away their position and literally be dead by morning.

1: Snap. 2: Upload. 3: Dead? We hope not!

Whether you're a relative of the military, a supporter, or military yourself, don't underestimate the dangers of giving your position away!

What to do

Photo editors can remove EXIF data and you can click on individual data items in the Windows property screen and delete them as well (though this takes time). In Windows 7, you can click a link in the properties window labeled "Remove Properties and Personal Information". Another simpler method is to disable geotagging in your camera/phone in the first place!

seminar destroy Tutorial
prev: The Consequences of Posting Online|INDEX|next: Tricks and Scams
Online Addiction: From gambling to surfing and online gaming, people can destroy themselves and others with online addiction.
Posting Online: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Protecting Photos: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Getting Tricked: You WERE doing fine... until someone convinced you to install a virus or give away your passwords. Don't fall for it!
Account Hijacking: One of the most common security risks today is people getting their accounts taken over and then used to trick their friends and family.
Trusting Webservices: An online service promises they'll 'Never abuse or misuse your data' and you believe them? Think again.

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Online Addiction

Concerned about online addiction? You should be. Learn the types, the signs, and the preventions.

[Click for full description]

The Consequences of Posting Online

It's fun to post online. What you think, what you feel. But words typed and posted on the Internet can come back to bite you more than anything you could say with your mouth.

[Click for full description]

Photo Safety

You can reveal far more than you intended when you post a photo online. Don't make a critical mistake and check your photos before they're online.

[Click for full description]

Tricks and Scams

Just because you won't willing give up data doesn't mean that I can't trick you out of it. Don't fall for these well known tricks!

[Click for full description]

Account Hijacking

One of the newest threats we face is the risk of someone getting control of your online account and using it against you and the people you know. Do everything you can to prevent that from happening!

[Click for full description]

Trusting Companies

Store, online or off, are not known for being fair and helpful unless it benefits them to be so. Good deals exist, but many are bad deals in disguise. It's not in your best interests to be too trusting with any of them.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]