by David L
This week I read an interesting article that concerns the safety of uploading pictures taken from a smartphone. The article “How a Cell Phone Busted a Hacker”, by Taylor Armerding, Armerding explains how the FBI tracked down an “Anonymous-linked CabinCr3w” hacktivist member from a pictures posted on various websites bragging about his achievements (Armerding, 2012). The hacker, Higinio O. Ochoa, hacked in and retrieved home addresses of police officers, and then posted them onto the internet. Ochoa was tracked down because of a Twitter post that linked to the site of which the information he gathered was publicly posted. His reason for being caught was because of a picture he posted of a female and a sign that says “PwNd by W0rmer & CabinCr3w” (Armerding, 2012). So the investigators took the posted picture, and many other pictures that referenced Ochoa and matched the picture’s “EXIF data (location, camera type, and other image information included in every photo taken with a smart phone.”(Armerding, 2012).
This relates to our class because it kind of shows us the usefulness of time-stamping (Chapter 2), like the article’s EXIF data, DBA’s and others can use the information created by time-stamping, and other methods of tracking changes made in a database.
This also relates into internet security because a lot of private information is stored into the picture when you use the camera of a smartphone. Think about how many pictures from Facebook are uploaded from a mobile smartphones, all of those pictures do contain somewhat “private” information. So be careful of what you upload, and to where you upload, and don’t use pictures taken from your smartphone to brag to the internet that you hacked an organization.
Taylor Armerding (2012, April 29). How a Cell Phone Busted a Hacker. Retrieved April 29, 2012, from http://www.pcworld.com/article/254596/how_a_cell_phone_busted_a_hacker.html#tk.hp_new