New tools to detect digital domestic abuse

He hacks into her online accounts, where he poses as her to insult her friends and family. He locks her out of her own Gmail account, devastating her sales career.

Carol-a composite invented by researchers who have heard many similar stories-is vulnerable to digital harassment because her ex-husband bought two of her devices, knows or can guess her passwords and has access to their children's phones.

A new clinical model developed by Cornell Tech researchers aims to respond systematically and effectively to the growing array of digital threats against victims of intimate partner violence. Working with the New York City Mayor's Office to End Domestic and Gender-Based Violence, the researchers created and piloted a questionnaire, a spyware scanning tool and a diagram for assessing clients' digital footprints.

The first-of-its-kind model can help counselors without tech expertise pinpoint online abuse-and protect the safety of abuse victims and their advisers. Using this strategy, researchers found potential spyware, compromised accounts or exploitable misconfigurations for 23 of the 44 clients they advised.

"Prior to this work, people were reporting that the abusers were very sophisticated hackers, and clients were receiving inconsistent advice," said Diana Freed, Cornell Tech doctoral student in the field of information science and co-lead author of "Clinical Computer Security for Victims of Intimate Partner Violence," presented Aug. 14 at the USENIX Security Symposium in Santa Clara, California.

"Some people were saying, "Throw your device out." Other people were saying, "Delete the app." But there wasn't a clear understanding of how this abuse was happening and why it was happening," Freed said. "We felt that a methodical approach through a uniform, data-driven consultation would yield better results so we can help other advocates do this type of work at the level it's needed."

Co-first author of the paper is Sam Havron, Cornell Tech doctoral student in computer science. Senior authors are Nicola Dell, assistant professor at the Jacobs Technion-Cornell Institute at Cornell Tech, and Thomas Ristenpart, associate professor at Cornell Tech.

The authors are among the researchers from Cornell Tech, Cornell in Ithaca and New York University collaborating to improve technological safety and security for survivors of intimate partner violence. Dell and Ristenpart were recently awarded a $1.2 million grant from the National Science Foundation to continue their research examining the role of tech in intimate partner abuse.

Abusers use a range of digital tools to stalk or harass their victims, from traditional spyware to tracking apps intended for more benign purposes, like finding one's phone. It can be extremely challenging to detect vulnerabilities amid the sheer number of apps, digital devices and online accounts most people use daily-particularly for counselors without tech skills.

"They were making their best efforts, but there was no uniform way to address this," Havron said. "They were using Google to try to help clients with their abuse situations."

At the same time, tech experts don't have the background to advise clients how to fix problems in ways that won't endanger them, such as angering an abuser who just noticed a deleted app or a changed password.

The researchers run a weekly tech clinic in New York City's Family Justice Centers, which provide a full range of services for intimate partner abuse victims. Through this work, the team developed and piloted its Technology Assessment Questionnaire, which includes such questions as, "Does the abuser show up unexpectedly or know things they shouldn't know?" and "Is there a chance the abuser knows (or could guess) the answers to your password reset questions?"

They also created the "technograph," a diagram which helps summarize clients' digital assets; and ISDi (IPV Spyware Discovery), a spyware scanning tool. ISDi scans devices for known spyware apps through a USB cable, rather than a downloadable app, making it impossible for an abuser to detect.

"This sort of tool doesn't exist anywhere else," Havron said. "In earlier work, we did a comprehensive scrape of the Google Play Store and eventually compiled a list of thousands of apps across marketplaces, and that's what the ISDi is based on."

The questionnaire, technograph and ISDi are all freely available on the project team's website.

Though the paper focused on intimate partner abuse, this method could be useful for any victims of online abuse, such as activists, dissidents or journalists, the researchers said.

Website search

Recently updated

OneNote Password Recovery Key Crack + Activator Download 2020 OneNote Password Recovery Key Crack + Serial Number A password recovery tool that is designed to retrieve passphrases for MS OneNote files by using a combination of various attacks
P2 Commander Crack + Activator Download P2 Commander Crack With License Key 2020 A reliable and effective solution that helps you to perform comprehensive digital forensic examinations and deleted data recovery
MailEnable Enterprise Premium Crack + Activator Download 2020 MailEnable Enterprise Premium Crack + Serial Number A powerful email server that integrates MAPI connector for Outlook, mobile connectivity, as well as sharing and collaboration options

Software News

Aug 4
For 16 years, CCleaner has been a popular computer system cleaning and optimization tool, known for efficiently removing unwanted files, programs and accumulated digital fragments from users' hard drives.
Aug 4
During the coronavirus pandemic, Zoom, Skype, and other videoconferencing systems have become our lifelines for workplace communication. But while those platforms work well for many kinds of virtual meetings and conferences, ...
Aug 3
Terrorist attacks often feature the use of homemade explosives. For the police and security forces to be able to take appropriate precautions and assess the damage after an attack, they need access to the right kind of tools. ...
Aug 3
Google has announced that as part of its effort to provide users with more ad transparency, it will begin testing the idea of using "trust tokens" which, unlike cookies, will allow website owners to authenticate users to ...
Jul 31
The European Commission has tasked German software giant SAP to develop a way to link at least 18 national virus-tracing apps to share data across EU borders, officials said Friday.
Jul 31
At Japan Advanced Institute of Science and Technology, researchers have successfully established relationships between games and law of motions in mind through analogy of physics and game refinement theory.
Jul 30
The makers of the photo editing app Facetune have launched a new version that's focused solely on retouching faces in videos.

About us

Welcome to new crack resource CrackDownloadz.com! Our service can generate cracks, keygens and serials for your software to unlock it. CrackDownloadz provides a lot of popular cracks and keygens. No spyware and adware at all, just download new cracks, keygens and serials. If you have a software that needs a crack feel free to contact us.

Also you may contact us if you have software that needs to be removed from our website.