SlideShare a Scribd company logo
Visual Hacking
Bradley W. Deacon
BRADLEY W
DEACON
Session Speaker
Bradley W Deacon
Bradley is a former Federal Agent and was one of the first members of the
Australian Federal Police Computer Crime Unit Sydney where in 1995 his
team was successful in having the first jail sentence imposed on a computer
hacker.
Bradley is a qualified non practising lawyer focussing on Cyber related Law,
with degrees in criminal justice, law, and postgraduate studies in
Criminology and Law. Additionally Bradley has a Postgraduate Certificate in
Distance Ed specialising in Digital Delivery from Penn State University.
Bradley also has a Masters in National Security with his thesis centred
around digital technology: “Evolving Digital Technology Terrorist Financing
& The Threat To U.S National Security”
As a cyber bullying and stalking advocate, Bradley was approached by
VCAT in 2014 to design and facilitate delivery of a social media awareness
package in 2015 for Victorian Court Staff and the Judiciary and was recently
a keynote speaker at the Say No 2 Bullying Conference on the Gold Coast.
Bradley lectures at several Australian Universities and colleges in a variety
of Cyber related Law units and justice units and is about to undertake a PhD
in Social Media by ‘publication’.
Session Outline
Learning Outcomes
• Background to visual hacking (shoulder surfing)
• Types of visual hacking
• Corporate espionage
• Internal office visual control mechanisms to minimize
visual hacking
• External visual control mechanisms to minimize visual
hacking
Visual Hacking-Shoulder Surfing
Telephone Calling Cards Early 1990’s
● Cards linked back to home/business phone account
● When away from home/business key in card # and
PIN #
● Calls billed to home/business account
● Option to key it in from phone or call an operator
and pass on card details and PIN #
● Several vulnerabilities resulted from such practice
Visual Hacking-Shoulder Surfing
Vulnerabilities
● Travellers would use pay phones at bus terminus,
airports, railway stations, shopping centres,
casinos, hotel lobbies
● Criminal gangs would hover around such pay phone
locations and pretended to be on adjoining phone
● Victim would call operator and pass on details of
card which the ‘shoulder surfer’ would note down or
film the details being entered and at this point the
card is compromised
Visual Hacking-Shoulder Surfing
Black Market For Card Details
● Calling card access details very attractive on black
market
● Compromised card holder usually only received a
phone bill once a month
● Pending on billing cycle card could be ‘live’ for up to
30 days or more
● Shoulder surfer would on sell the card details for as
low as $20
● Sold usually at locations where card can be
demonstrated to work
Visual Hacking-Shoulder Surfing
Cost of Compromise
● Usually person who bought card details would also
on sell card for a profit hundreds of times
● The domino effect of such a compromise amounted
to phone bills for hundreds of thousands and even
millions of dollars being delivered to card owner
● Simultaneous calls were made to all corners of the
globe at a time when international calls were
anywhere between $2 per minute and $8 per
minute
Visual Hacking-Shoulder Surfing
Lack of Safeguards In Place By Phone Company
● As one card was connected at hundreds of
locations simultaneously phone companies failed to
have safeguards in place to detect such activity
● As a result of the scenario in the following
Infographic in the next slide a recommendation
report was put forward to the phone companies to
implement security safeguards to detect
simultaneous use by one card
History & A Case Study Of Visual Hacking
Visual Hacking-Shoulder Surfing
A Simple Solution That Eliminated The Issue
● Safeguards implemented by the phone companies
were not expensive to roll out
● Provided a barrier that prevented card from being
used simultaneously
● Customer education was also a key component of
the phone companies strategy
● As a result of proactive activity, reducing fraud
companies that were becoming more reliant on
computers in the early 90’s started to look at
security as a front of mind process
Visual Hacking 2016 Style
From 1990’s to 2016 Visual Hacking
● Shoulder surfing now has a more appropriate name
for the digital age
● ‘Visual Hacking’ which can be defined simply as to
being as “obtaining or capturing sensitive
information for unauthorized use”
Visual Hacking-Shoulder Surfing
Examples of Visual Hacking
● Taking photos of documents left on a printer or
information displayed on a screen
● Memorising details seen on a screen or a desk
● Micro audio recording of details seen
● Simply writing down employee login information that
is taped to a computer monitor
● External visual hacking via telephoto lenses through
untinted windows
Visual Hacking-Shoulder Surfing
Visual Hackers Can Be
● Staff members
● Interns
● Contractors
● Clients
● Visitors
● Persons in adjoining buildings
Visual Hacking-Shoulder Surfing
Visual Hacking Experiment
● In the Visual Hacking Experiment, a study
conducted by Ponemon Institute and jointly
sponsored by 3M Company and the Visual Privacy
Advisory Council, white-hat hackers posing as
temporary or part-time workers were sent into the
offices of eight U.S.-based, participating companies.
Visual Hacking-Shoulder Surfing
Visual Hacking Experiment
● The hackers were able to visually hack sensitive
and confidential information from exposed
documents and computer screens.
● Able to visually hack information such as employee
access and login credentials, accounting
information and customer information in 88 percent
of attempts and were not stopped in 70 percent of
incidents.
● The following short video demonstrates the
experiment
Visual Hacking
Safeguards To Help Prevent Visual Hacking
● The best place to begin clamping down on visual
privacy threats, is to perform a visual privacy audit
● The visual privacy audit will help you assess your
key-risk areas and evaluate existing security
measures that are in place
Visual Hacking
Visual Privacy Audit
• Does your organization have a visual privacy policy?
• Are shredders located near copiers, printers and desks
where confidential documents are regularly handled?
• Are computer screens angled away from high-traffic
areas and windows, and fitted with privacy filters?
• Do employees keep log-in and password information
posted at their workstations or elsewhere?
Visual Hacking-Shoulder Surfing
Visual Privacy Audit Continued
• Are employees leaving computer screens on or
documents out in the open when not at their desks?
• Do employees know to be mindful of who is on the
premises and what they are accessing,
photographing or viewing?
• Are there reporting mechanisms for suspicious
activities?
Visual Hacking-Shoulder Surfing
Key Points To Take Away
• Visual Hackers can be anyone who has access to your office
or are in close proximity
• Reception areas are very vulnerable to visual hacking
• What will clients/visitors think of your privacy safeguards if
they can openly see information
• Make sure staff are aware of the phone card shoulder surfing
scenario and highlight to them using laptops and smartphones
in crowded places leave them open to visual hacking
• Simple safeguards and a visual privacy policy will help you
protect your business
Visual Hacking
Visual Hacking Hot Zone
Visual Hacking-Shoulder Surfing
Further Information & Sample Privacy
Audit Checklist
● For additional information on visual hacking go to
my LinkedIn Profile and see my LinkedInPulse Blog
● ‘Visual Hacking An Old Tactic With A New Name’
● https://www.linkedin.com/pulse/visual-hacking-old-
tactic-new-name-bradley-w-deacon?trk=mp-reader-
card
Visual Hacking

More Related Content

PPTX
Darknet (ec)
PPT
Darknet
PPTX
Darknet - Is this the future of Internet?
PPTX
Dark web
PDF
Dw communication
PPTX
Dark and Deep web
PPTX
Dark Side of the Net Lecture 4 TOR
PPT
Introduction to hackers
Darknet (ec)
Darknet
Darknet - Is this the future of Internet?
Dark web
Dw communication
Dark and Deep web
Dark Side of the Net Lecture 4 TOR
Introduction to hackers

What's hot (20)

PPTX
Internet security
PPTX
How you can protect your online identity, online privacy and VPNs
PPTX
Internet and personal privacy
PPT
NewIinternet security
PPTX
Personal Internet Security Practice
PPT
Introduction To Computer Security
PPTX
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
PPTX
How to hack or what is ethical hacking
PPTX
Computer hacking
PPTX
I want to be a cyber forensic examiner
PPT
PDF
What is a Hacker (part 1): Types, tools and techniques
PDF
What is Social Engineering? An illustrated presentation.
PPT
PPT
Hackers Cracker Network Intruder
PPTX
Public Wi-Fi security 101
PPT
Computer Security
PPTX
Deep web, the unIndexed web
PPTX
Computer Hacking - An Introduction
PDF
Information security & data security | Chandan Singh Ghodela
Internet security
How you can protect your online identity, online privacy and VPNs
Internet and personal privacy
NewIinternet security
Personal Internet Security Practice
Introduction To Computer Security
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
How to hack or what is ethical hacking
Computer hacking
I want to be a cyber forensic examiner
What is a Hacker (part 1): Types, tools and techniques
What is Social Engineering? An illustrated presentation.
Hackers Cracker Network Intruder
Public Wi-Fi security 101
Computer Security
Deep web, the unIndexed web
Computer Hacking - An Introduction
Information security & data security | Chandan Singh Ghodela

Viewers also liked (13)

KEY
Defamation on the internet
PPTX
Internet Defamation
PPTX
Defamation on the Internet
PDF
Social media and defamation law (watermarked)
PPTX
Online Defamation
PPTX
Defamation and copyright act
PPTX
PT_Internet_Addiction
PPT
Cyber defamation
PPTX
Defamation
PPTX
Law of defamation
PPTX
Defamation ppt
PPTX
Online defamation through social media an attempt to reconcile conflicts bet...
Defamation on the internet
Internet Defamation
Defamation on the Internet
Social media and defamation law (watermarked)
Online Defamation
Defamation and copyright act
PT_Internet_Addiction
Cyber defamation
Defamation
Law of defamation
Defamation ppt
Online defamation through social media an attempt to reconcile conflicts bet...

Similar to Visual hacking (ec) (20)

PPTX
Mobisheild sales promotion presentation.
PDF
3 steps security
PPTX
10TH FEB CYBER SECURITY by C-DAC Noida.pptx
PPTX
CCIAOR Cyber Security Forum
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PPTX
IT Security and Wire Fraud Awareness Slide Deck
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PPT
Responsible Digital Citizensip in the 21st Century.ppt
PPTX
What is Cybercrime and How to Prevent Cybercrime?
PDF
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
PDF
Security and Compliance
PPTX
Cyberattacks.pptx
PPTX
Cyber Security Seminar
PPTX
Seecure Columbia
PDF
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
PPTX
Sholove cyren web security presentation2
PPTX
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
PPTX
Secure End User
PPTX
E banking & security concern
PDF
Understanding Digital Wallet Fraud & FAQ
Mobisheild sales promotion presentation.
3 steps security
10TH FEB CYBER SECURITY by C-DAC Noida.pptx
CCIAOR Cyber Security Forum
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
IT Security and Wire Fraud Awareness Slide Deck
ISACA CACS 2012 - Mobile Device Security and Privacy
Responsible Digital Citizensip in the 21st Century.ppt
What is Cybercrime and How to Prevent Cybercrime?
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Security and Compliance
Cyberattacks.pptx
Cyber Security Seminar
Seecure Columbia
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Sholove cyren web security presentation2
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Secure End User
E banking & security concern
Understanding Digital Wallet Fraud & FAQ

More from Bradley W. Deacon (14)

PPTX
Online Contracting
PPT
Twitter For Everyone
PPTX
Pinterest for everyone
PPT
#SeizeTheDay
PPT
Instagram For Everyone
PPT
Tweet Beam Explained
PPT
Grow Your Business With Pinterest
PPT
Social Media Training Pinterest (7/2014)
PPT
Communication Skills Learning Styles In A Justice Environment
PPTX
Grow Your Business With A Hash #
PPT
A Parents Guide To Instant Messaging and Chat Options 2014
PDF
One Bad Tweet & Or Post & %$#@
PPT
Bitcoin A General Overview
PPTX
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Online Contracting
Twitter For Everyone
Pinterest for everyone
#SeizeTheDay
Instagram For Everyone
Tweet Beam Explained
Grow Your Business With Pinterest
Social Media Training Pinterest (7/2014)
Communication Skills Learning Styles In A Justice Environment
Grow Your Business With A Hash #
A Parents Guide To Instant Messaging and Chat Options 2014
One Bad Tweet & Or Post & %$#@
Bitcoin A General Overview
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Computing-Curriculum for Schools in Ghana
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
master seminar digital applications in india
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Computing-Curriculum for Schools in Ghana
Weekly quiz Compilation Jan -July 25.pdf
GDM (1) (1).pptx small presentation for students
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Chinmaya Tiranga quiz Grand Finale.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
VCE English Exam - Section C Student Revision Booklet
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
master seminar digital applications in india

Visual hacking (ec)

  • 2. BRADLEY W DEACON Session Speaker Bradley W Deacon Bradley is a former Federal Agent and was one of the first members of the Australian Federal Police Computer Crime Unit Sydney where in 1995 his team was successful in having the first jail sentence imposed on a computer hacker. Bradley is a qualified non practising lawyer focussing on Cyber related Law, with degrees in criminal justice, law, and postgraduate studies in Criminology and Law. Additionally Bradley has a Postgraduate Certificate in Distance Ed specialising in Digital Delivery from Penn State University. Bradley also has a Masters in National Security with his thesis centred around digital technology: “Evolving Digital Technology Terrorist Financing & The Threat To U.S National Security” As a cyber bullying and stalking advocate, Bradley was approached by VCAT in 2014 to design and facilitate delivery of a social media awareness package in 2015 for Victorian Court Staff and the Judiciary and was recently a keynote speaker at the Say No 2 Bullying Conference on the Gold Coast. Bradley lectures at several Australian Universities and colleges in a variety of Cyber related Law units and justice units and is about to undertake a PhD in Social Media by ‘publication’.
  • 3. Session Outline Learning Outcomes • Background to visual hacking (shoulder surfing) • Types of visual hacking • Corporate espionage • Internal office visual control mechanisms to minimize visual hacking • External visual control mechanisms to minimize visual hacking
  • 4. Visual Hacking-Shoulder Surfing Telephone Calling Cards Early 1990’s ● Cards linked back to home/business phone account ● When away from home/business key in card # and PIN # ● Calls billed to home/business account ● Option to key it in from phone or call an operator and pass on card details and PIN # ● Several vulnerabilities resulted from such practice
  • 5. Visual Hacking-Shoulder Surfing Vulnerabilities ● Travellers would use pay phones at bus terminus, airports, railway stations, shopping centres, casinos, hotel lobbies ● Criminal gangs would hover around such pay phone locations and pretended to be on adjoining phone ● Victim would call operator and pass on details of card which the ‘shoulder surfer’ would note down or film the details being entered and at this point the card is compromised
  • 6. Visual Hacking-Shoulder Surfing Black Market For Card Details ● Calling card access details very attractive on black market ● Compromised card holder usually only received a phone bill once a month ● Pending on billing cycle card could be ‘live’ for up to 30 days or more ● Shoulder surfer would on sell the card details for as low as $20 ● Sold usually at locations where card can be demonstrated to work
  • 7. Visual Hacking-Shoulder Surfing Cost of Compromise ● Usually person who bought card details would also on sell card for a profit hundreds of times ● The domino effect of such a compromise amounted to phone bills for hundreds of thousands and even millions of dollars being delivered to card owner ● Simultaneous calls were made to all corners of the globe at a time when international calls were anywhere between $2 per minute and $8 per minute
  • 8. Visual Hacking-Shoulder Surfing Lack of Safeguards In Place By Phone Company ● As one card was connected at hundreds of locations simultaneously phone companies failed to have safeguards in place to detect such activity ● As a result of the scenario in the following Infographic in the next slide a recommendation report was put forward to the phone companies to implement security safeguards to detect simultaneous use by one card
  • 9. History & A Case Study Of Visual Hacking
  • 10. Visual Hacking-Shoulder Surfing A Simple Solution That Eliminated The Issue ● Safeguards implemented by the phone companies were not expensive to roll out ● Provided a barrier that prevented card from being used simultaneously ● Customer education was also a key component of the phone companies strategy ● As a result of proactive activity, reducing fraud companies that were becoming more reliant on computers in the early 90’s started to look at security as a front of mind process
  • 11. Visual Hacking 2016 Style From 1990’s to 2016 Visual Hacking ● Shoulder surfing now has a more appropriate name for the digital age ● ‘Visual Hacking’ which can be defined simply as to being as “obtaining or capturing sensitive information for unauthorized use”
  • 12. Visual Hacking-Shoulder Surfing Examples of Visual Hacking ● Taking photos of documents left on a printer or information displayed on a screen ● Memorising details seen on a screen or a desk ● Micro audio recording of details seen ● Simply writing down employee login information that is taped to a computer monitor ● External visual hacking via telephoto lenses through untinted windows
  • 13. Visual Hacking-Shoulder Surfing Visual Hackers Can Be ● Staff members ● Interns ● Contractors ● Clients ● Visitors ● Persons in adjoining buildings
  • 14. Visual Hacking-Shoulder Surfing Visual Hacking Experiment ● In the Visual Hacking Experiment, a study conducted by Ponemon Institute and jointly sponsored by 3M Company and the Visual Privacy Advisory Council, white-hat hackers posing as temporary or part-time workers were sent into the offices of eight U.S.-based, participating companies.
  • 15. Visual Hacking-Shoulder Surfing Visual Hacking Experiment ● The hackers were able to visually hack sensitive and confidential information from exposed documents and computer screens. ● Able to visually hack information such as employee access and login credentials, accounting information and customer information in 88 percent of attempts and were not stopped in 70 percent of incidents. ● The following short video demonstrates the experiment
  • 16. Visual Hacking Safeguards To Help Prevent Visual Hacking ● The best place to begin clamping down on visual privacy threats, is to perform a visual privacy audit ● The visual privacy audit will help you assess your key-risk areas and evaluate existing security measures that are in place
  • 17. Visual Hacking Visual Privacy Audit • Does your organization have a visual privacy policy? • Are shredders located near copiers, printers and desks where confidential documents are regularly handled? • Are computer screens angled away from high-traffic areas and windows, and fitted with privacy filters? • Do employees keep log-in and password information posted at their workstations or elsewhere?
  • 18. Visual Hacking-Shoulder Surfing Visual Privacy Audit Continued • Are employees leaving computer screens on or documents out in the open when not at their desks? • Do employees know to be mindful of who is on the premises and what they are accessing, photographing or viewing? • Are there reporting mechanisms for suspicious activities?
  • 19. Visual Hacking-Shoulder Surfing Key Points To Take Away • Visual Hackers can be anyone who has access to your office or are in close proximity • Reception areas are very vulnerable to visual hacking • What will clients/visitors think of your privacy safeguards if they can openly see information • Make sure staff are aware of the phone card shoulder surfing scenario and highlight to them using laptops and smartphones in crowded places leave them open to visual hacking • Simple safeguards and a visual privacy policy will help you protect your business
  • 21. Visual Hacking-Shoulder Surfing Further Information & Sample Privacy Audit Checklist ● For additional information on visual hacking go to my LinkedIn Profile and see my LinkedInPulse Blog ● ‘Visual Hacking An Old Tactic With A New Name’ ● https://www.linkedin.com/pulse/visual-hacking-old- tactic-new-name-bradley-w-deacon?trk=mp-reader- card