PDA

View Full Version : Porn Stick Detects Pr0n



Gingersnap
11-18-2010, 01:03 PM
Products track hidden information on electronic devices
November 17th, 2010 @ 10:17pm
By Scott Haws

SALT LAKE CITY -- Every time you visit a website, send an e-mail, or text, you're leaving a digital footprint. A couple of products can recover hidden information you may not even know is there.

What it means is when you delete something, it's not really gone; you just can't see it.

One product getting a lot of attention is the Porn Stick. It's a simple thumb drive that will scan your entire computer and find any current or deleted pornographic images. Special Agent Rusty Isakson with the Internet Crimes Against Children Task Force depends on the latest technology to help catch child porn predators.

"The digital world really does give you a format where you can track and trace," he said.

John and Laurel Porter rely on surprise inspections to keep track of their three children's laptops and cell phones.

"We just walk downstairs and say give me your phone. And with them, we'll look at their history, we take their iPod and see what they're listening to," John said.

"Just like I tell them now, I'm going to monitor your e-mails, I can monitor your texts. That's kind of the rule," Laurel said.

The rules are changing, though, because parents like the Porters now have access to essentially the same technology that police have had, thanks to companies like Utah-based Paraben, which specializes in computer forensic software.

Amber Schroeder, CEO of Paraben Corp., said, "A lot of people don't realize how dirty surfing the Internet can be for your machine."

http://i54.tinypic.com/15yvltk.jpg
The Porn Stick is one of Paraben's hottest new products.

"It's designed to actually go out and find illicit images and content on your computer and allow you to go through them and remove them," Schroeder said.

It's not just parents who are buying the Porn Stick. In fact, Paraben's biggest customer is spouses, in particular women.

"I wish 100 percent of the people out there were secure in their relationships, but the reality is they're not, and this is our No. 1 customer," Schroeder said.

KSL (http://www.ksl.com/?nid=148&sid=13314210)

Articulate_Ape
11-18-2010, 01:11 PM
Those look awfully small to me. Do they come in industrial size?

Gingersnap
11-18-2010, 01:34 PM
Those look awfully small to me. Do they come in industrial size?

Don't worry - they're refillable. :p

While these seem like an interesting idea for home snoops, won't sex predators just use them to remove evidence? :confused:

Odysseus
11-18-2010, 03:24 PM
I'm sure that they will, but it's also a good idea if you're deploying and want to make your laptop General Order 1A compliant.

djones520
11-18-2010, 03:59 PM
I'm sure that they will, but it's also a good idea if you're deploying and want to make your laptop General Order 1A compliant.

Do they check yours? That sucks.

Not that I got anything like that on my laptop... nope... none at all...

Rockntractor
11-18-2010, 04:03 PM
If you plug it into your wife will she no longer be able to get naked?:confused::eek:

Odysseus
11-18-2010, 04:15 PM
Do they check yours? That sucks.

Not that I got anything like that on my laptop... nope... none at all...

Not the first time, but when I came back from R&R leave on my first tour, the did a full check. Fortunately, they warned us the day before, and everyone who had any was able to delete anything that would have been questionable. The way that they did it was to do a thumbnail view search of all images on the laptop. Since I was our PowerPoint master gunner, I had all of our PAO's images and a bunch of pics from others for our final hooah video production, not to mention all sorts of other graphics, so checking my laptop took about twenty minutes. Eventually, they got bored with looking at NIPR maps of our AO and let me through, but apparently somebody got caught with images of children and got nailed, deservedly so.

Since then, I've been back and forth several times and they haven't done it, so I suspect that they either didn't find enough to justify the continued searches, or somebody at a high enough level said "enough".

Bubba Dawg
11-18-2010, 07:06 PM
I like pronography. :)

megimoo
11-18-2010, 07:52 PM
Not the first time, but when I came back from R&R leave on my first tour, the did a full check. Fortunately, they warned us the day before, and everyone who had any was able to delete anything that would have been questionable. The way that they did it was to do a thumbnail view search of all images on the laptop. Since I was our PowerPoint master gunner, I had all of our PAO's images and a bunch of pics from others for our final hooah video production, not to mention all sorts of other graphics, so checking my laptop took about twenty minutes. Eventually, they got bored with looking at NIPR maps of our AO and let me through, but apparently somebody got caught with images of children and got nailed, deservedly so.

Since then, I've been back and forth several times and they haven't done it, so I suspect that they either didn't find enough to justify the continued searches, or somebody at a high enough level said "enough".
Whats to stop a hostile person or website from 'sticking 'an 'x' rated photo on your drive by embedding it in a terrain map or an innocent string of news text.If a Trojan virus is capable of takeing over a system and downloading data they are surely able to plant false image evidence on your laptop by means of Steganography !

If a hostile persons intent is to destroy someone's career by planting reputation destroying evidence on your computer whats to stop them ?In the case of child Pronography you are guilty until proven innocent and even then you are forever suspect !

The risks for you as the recognized owner of the laptop and your inability to scrutinize every piece of data and every file for on your hard drive makes you an ideal candidate for a court marshal.Any complex terrain map or overhead imaging is ideal for hiding files or even Child Pornography .To the user it looks like a terrain map and if compared to the original there is no visual difference .An associate downloaded program will re assemble the image on demand and add it to the disk image files.

What is Child Pornography?

Under federal law (18 U.S.C. 2256), child pornography1 is defined as any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where ......


steganography

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

Gingersnap
11-18-2010, 08:11 PM
Well, then using this porn stick would at least detect any malicious images so that would be good.

Zathras
11-18-2010, 08:40 PM
Wait....I thought the internet was for porn???? At least that's what the song says.

Odysseus
11-18-2010, 08:42 PM
Whats to stop a hostile person or website from 'sticking 'an 'x' rated photo on your drive by embedding it in a terrain map or an innocent string of news text.If a Trojan virus is capable of takeing over a system and downloading data they are surely able to plant false image evidence on your laptop by means of Steganography !

If a hostile persons intent is to destroy someone's career by planting reputation destroying evidence on your computer whats to stop them ?In the case of child Pronography you are guilty until proven innocent and even then you are forever suspect !

It's a legitimate concern, but the check that was done at the entry point in Germany was a simple visual check of what was listed as a media file type, based on the extension. Unless the trojan extracted the image prior to the check but after your own check, there'd be nothing to look at. Besides, a trojan would leave a forensic trail, so you'd be able to defend yourself.

Rockntractor
11-18-2010, 08:53 PM
Wait....I thought the internet was for porn???? At least that's what the song says.

True but originally we thought woman were just for sex but then we discovered they have many other uses!

Odysseus
11-18-2010, 09:16 PM
True but originally we thought woman were just for sex but then we discovered they have many other uses!

I'd facetiously ask what they are, but I don't feel like getting flamed.

Gingersnap
11-18-2010, 09:41 PM
I'd facetiously ask what they are, but I don't feel like getting flamed.

Oh, someone will happen along to enlighten you. :p

megimoo
11-18-2010, 10:26 PM
It's a legitimate concern, but the check that was done at the entry point in Germany was a simple visual check of what was listed as a media file type, based on the extension. Unless the trojan extracted the image prior to the check but after your own check, there'd be nothing to look at. Besides, a trojan would leave a forensic trail, so you'd be able to defend yourself.Do you as a mater of course check your laptop for intrusions.I don't mean a simple virus but something more elegant

.There are people writing code who are able to insert a Trojan as an intrusion tool without leaving any trail .They are usually written as a future payload to enable access to the computer, if needed, in the future.They by definition keep a very low profile and awaken only when commanded .Sort of an elegant 'back door' available when commanded.

Most people who actually write malicious code are juveniles with too much time on their hands and a need to be recognized for their skills although I wouldn't put it past those company's who write anti Trojan code to write a few themselves just to stay in business..

The best creative professional programmers mostly work for the NSA,Hughes, Lockheed Martin or some high level security firm and wouldn't waste their time writing 'kiddie code'.Any computer is vulnerable.I don't care what security you have,someone will be able to circumvent it.