• Courses
  • Who
  • Contact Me
  • Privacy Policy
  • Facebook Security

ikawnoclastic thoughts

  • A City Full of Unmanned Vehicles (TEDxLafayette 2014)

    November 23rd, 2014

    On November 22, 2014 I participated in TEDxLafayette. Listed below is the prepared text that I worked from while preparing for this talk.

    There was more content than I could fit into the time available (just eighteen minutes), so I had to cut back. The parts I left out are still listed below with strikethrough text.

    Entrance

    Title Slide.

    When we talk about unmanned vehicles, most people think of drones. In particular, this kind…

    Slide with Military Drone Firing Missile.

    And it’s not surprising. Drones strikes are all over the news despite their mostly secretive use in combat zones.

    Military Use of Drones

    Slide with Military Surveillance Drones
    Military commanders are always interested in knowing more about the enemy. They want the ability to see over the next hill, to determine the composition, disposition, and strength of the enemy. The first uses of drones in modern warfare were focused on observation and surveillance. They are quicker to deploy and cheaper to operate than military spy satellites.

    These small drones can be easily deployed in the field, literally by throwing them into the air. Once airborne, soldiers can remotely fly these drones over the target area to find and observe the enemy. With a remote control and a direct video feed from the drone, soldiers can locate enemy forces and determine their strength and readiness quickly.

    Larger drones can be launched like traditional aircraft from standard air fields. They are designed to stay in the air for long periods of time to loiter over large areas. Drones such as the MQ-9 Reaper carry missiles and laser-guided bombs that can strike at the enemy. Their pilots can be located anywhere in the world.

    Drone pilots operate in relative safety while flying. Drones that are shot at, shot down, or crash do not kill or injure the pilot. Pilots can even take breaks and hand the controls over to someone else during the flight. Larger drones that operate for long periods of time can rotate through several flight crews, each crew sleeping in their own bed at night.

    Most of the younger soldiers are well-prepared for flying drones in the military having received their training from Xbox University and the School of PlayStation.

    Slide with advanced drones.

    Drones are also being used to solve problems in the changing battlefield. These drones are examples of the use of advanced technology to aid soldiers. The Black Hornet Nano on the left is designed to fly in tight quarters, look around corners, over walls, and around obstructions. Soldiers fly it with a remote control with an integrated video display. The T-Hawk drone on the right is in use by the British Army in counter-IED operations. The T-Hawk was also used at the Fukushima Dai-Ichi nuclear power station to survey the damage. The high radiation levels prevented humans from operating around portions of the plant, but this drone can go where people cannot.

    Slide with the CBP drones.

    The same basic military drones have been repurposed for use inside the United States. NASA and NOAA have drones for research and environmental monitoring. In 2007, a NASA drone was used to survey Southern California wildfires and direct firefighters where they would be more effective. The Department of Homeland Security and Customs and Border Protection uses several drones like this one to patrol the Canadian and Mexican borders.

    Protests Associated with Drones

    First slide of protests about killing children, legal questions, and STOP!!

    The use of drones by the military has raised many ethical and legal questions. Many protest the targeted killing of people by remote control and the collateral damage and civilian casualties drones cause.

    Second slide with a protest sign about drone terrorism and the use of drones on the border.

    As those combat-focused drones are repurposed for use within our own borders, many more questions are raised about government intentions.

    Last protest sign with Obama campaign look.

    The appropriate use of drones on the battlefield in some distant land and here within our own country is set by policy at the very top levels of government.

    There are many important issues and a wide-ranging debate is certainly needed. But that’s not what I am here to talk about.

    A Brighter Future

    BLANK SLIDE

    I see a brighter future for unmanned vehicles in our society. I see a more useful purpose in having unmanned and autonomous vehicles all around us.

    One of the best uses of unmanned vehicles is to enhance public safety.

    Public Safety

    Firefighters

    Slides with fires and fire truck.

    Firefighters rely on their training and the experience of the senior firefighters and leaders. Upon arriving at the fire the team immediately begins to organize and plan how to attack the fire and save lives and property. If assistance is needed, a call is made for additional fire crews.

    But what if these planning steps could occur before the firefighters arrived, maybe while in the truck on the way to the fire? Using an unmanned aerial vehicle launched from the fire station when the call comes in, the firefighters could receive detailed information about the size and scale of the fire before they arrive. Instructions and assignments could be given to the crew while in route. Additional equipment and crews could be called in if needed before the first truck pulls up.

    Effectively, firefighters could have their own aerial surveillance plane flying over the fire providing real-time imagery. With temperature sensors, hotspots could be located. With chemical sensors, flammable and hazardous gases could be detected. People in need of rescue could be spotted.

    Police

    Slides with police cars and SWAT team.

    The entire police force in West Lafayette now use body-worn cameras. These types of cameras show a first-person perspective from the officer and provide the department and the citizens of the city with accountability and transparency. In addition to the police car dashboard camera systems, an officer’s direction interaction with the public can be recorded, situations can be deescalated, complaints against officers can be proved or disproved, and additional evidence for court is available.

    Body-worn cameras, like those used by the West Lafayette Police Department, and dashboard cameras provide information after the fact though. Police officers may need information in advance of arriving at the scene of an emergency call. Situational awareness can be critical in saving lives. Unmanned aerial vehicles could provide situation awareness by being deployed when emergency calls are made, traveling quickly to the scene, and loitering over the area providing real-time video to dispatchers and officers. Knowing more about the situation before arriving can allow officers to be prepared and for backup to be called before the situation escalates.

    Having an eye in the sky also allows suspects to be followed after fleeing a crime scene. If the robbers are speeding away or running through the alley before the police cars pull up, an unmanned aerial vehicle can be flying overhead following the suspects. A UAV is cheaper to operate than a helicopter, is smaller and quieter, and can provide real-time location data on the suspects. Smaller UAVs can be used inside buildings to assess hostage and standoff situations.

    Unmanned aerial vehicles can also provide crime scene support and assist in searching for fugitives and missing persons.

    Transportation Systems

    Slide with traffic and car accident.

    Most major roadways have sensors to detect the flow of traffic. Transportation officials use this information to monitor traffic volume. You can even see this information in navigation apps that show you the flow of traffic. When you see a lot of red ahead on your map, you are probably going to be moving slowly for a while. Some apps even provide visual indicators of traffic accidents. While there are some traffic cameras at key intersections, there is no way currently to provide complete camera coverage for the entire roadway.

    Take accidents for example. Most are reported through 911 calls. A good number of these accidents do not occur on camera. Emergency dispatchers rely on the caller to provide the details. The use of unmanned and even autonomous aerial systems could provide visual information quickly to dispatchers and emergency personnel. The number and types of injuries could be determined before the emergency personnel arrive. Plans to attack a vehicle fire and rescue people could be made before firefighters jump out of their truck.

    Emergency Response and Disaster Relief

    Slides with police command center, Red Cross disaster relief, and NRC command center

    In emergency response and disaster relief situations the most valuable commodity is information. Natural disasters often destroy much of the communication infrastructure making it difficult to gather and share information about relief needs and directing the response. Sadly, we are all too familiar with natural disasters and emergencies in our own community.

    Unmanned and autonomous vehicles could be deployed quickly in a disaster area to bring more information to the incident command centers so that decisions can be made quickly to save lives, protect property, and help a community heal faster. Using current technology, UAVs can provide high-resolution mapping of an area, just by drawing on a square on a digital map. UAVs could be used to loiter over a disaster area to watch for fires, use sensors to find missing persons, and to provide communications support to personnel on the ground.

    Hobbyists

    BLANK SLIDE

    While the military-industrial complex may have brought about the first drones, I think the way to bring these technologies to cities is through experimentation, innovation, and entrepreneurship. The wild-eyed dreamers and tinkerers in their garages, maker spaces, and university labs are creating cool technologies now that will fuel this vision in the future.

    Slide with the hobbyist-built rovers and quadcopters.

    This is the Maker Movement. Their tools are cheap electronics, kits, digital design tools, 3D printers, laser cutters, source code, and a pile of junk to source as parts.

    Slide with the 3DR Iris+ and the hexacopter.

    We have already seen what a hobbyist can do with an idea. These UAVs are bare-bones flying platforms with software. An app on your mobile device can provide the mission data to the UAV for autonomous flight. You can add your own sensors and payloads to make it do something useful.

    A graduate student in Europe developed an ambulance drone for his masters research thesis. The first prototype carries an automated external defribrillator unit that can arrive within a few minutes of the emergency call.

    Slide with the DJI Phantom.

    This is a growing industry in unmanned aerial vehicles. We have quickly moved from a hobbyist with a kit to fully assembled and tested products that you can buy right now. The transition from first tinkering with home-built UAVs to today has been about seven years.

    While there are still kits available, companies such as DJI and 3D Robotics are focusing on aerial photography and mapping solutions.

    BLANK SLIDE

    Technology Drivers Today

    Driverless Cars

    In the U.S. in 2012 more than 33,000 people died in vehicle accidents. While that number has been steadily declining, that’s still a large number of people. Vehicle safety systems such as airbag, crash avoidance, and driver assistance systems have helped lower that number. However, most accidents are related to driver error.

    If we can eliminate the driver, can we prevent even more deaths?

    For those that cannot drive, can we improve their mobility?

    Slide with the Google Car with Eric, Sergey, and Larry

    Most likely you have heard of the Google Self-driving Car. For many years research has been conducted to bring the driverless vehicle to reality. And Google is not the only organization interested in this. Most major car manufacturers have announced strategies related to driverless cars as future products.

    Slide with other Google Self-Driving Cars

    There are still many challenges in bringing driverless cars to our cities. Bad weather, poor visibility, parking lots and garages, potholes, construction zones, pedestrians, bicycles, and reckless drivers are challenging enough for human drivers. For the current fleet of driverless cars, those are still issues to be solved.

    Google is in a unique position in tackling these challenges. Consider that Google products such as Google Maps and its navigation service and Street View provide input to the self-driving car system. When new stop signs are added to an intersection, the car cannot only detect the sign and stop but also submit it as a new update to the map. These cars learn more about the environment as they drive through it.

    Package Delivery

    Slide with Amazon and DHL drones.

    Amazon, Google, DHL, and others are currently experimenting with package delivery direct to your home or business using UAVs. Delivery by drone could relieve some road traffic congestion and reduce greenhouse emissions as well as shorten delivery time.

    As Amazon continues to build new distribution centers closer to the populations it serves, it can use those centers as hubs for UAV deliveries. Instead of a truck, a UAV would be loaded at the center with the products and a flight plan for the delivery. The UAV could deliver the package directly the customer’s doorstep and then return to the distribution center for a fresh charge and another delivery.

    DHL is currently using its Parcelcopter in experimental deliveries to a remote island in the North Sea. It’s payload is medicine and travels when other forms of transportation are not available. DHL will be able to quickly improve the system over time as the North Sea is challenging location to fly because of the weather.

    If you combine driverless vehicles and the need to deliver large volumes of goods, then you must also consider the possibility of autonomous long-haul trucks as well.

    BLANK SLIDE

    Preparing Cities

    Slide with Chicago Sky line.

    As unmanned and autonomous vehicles become more a mature and reliable technology, how do we prepare our cities for them?

    The FAA

    Slide with the FAA logo.

    For aerial vehicles, the Federal Aviation Administration is the protector of the national air space in the United States. Safety is the primary mission of the FAA. There are many concerns about unmanned aerial vehicles intermingling with aircraft in the sky.

    The FAA defines three types of unmanned aerial system operations. A civil UAV use allows for research and development, but not for carrying people or property for compensation or hire. A Public UAV operation includes firefighting, law enforcement, disaster recovery, and search and rescue operations. For civil and public uses of UAVs there is an application, review, and approval process.

    Model Aircraft is the designation for hobbyists and needs no special filing with the FAA.The current rules for hobbyist UAVs is that they have to operate below 400 feet, within sight of the operator, and away from airports. This affords the hobbyist an opportunity to experiment but limits the ability of innovators to turn their ideas into commercial operations.

    Under these rules, it is not possible for anyone to provide unmanned aerial services for compensation. A company cannot legally sell you a video of your property taken from a UAV, deliver products to you, or even provide an aerial survey of your property or farmland.

    In 2012, Congress directed the FAA to integrate unmanned aircraft systems into the national air space. The FAA has issued interim rules and allowed some commercial uses of UAVs. A final rule is expected later but the hope is that there will be a balance between safety and the entry of commercial UAV operations into the national air space.

    States allowing driverless cars

    Slide with the states allowing driverless cars.

    This map shows the states that currently allow driverless vehicles on their roads. California, Nevada, Michigan, Florida, and the District of Columbia. There is still a lot of open space on that map.

    The city of Coeur d’Alene, Idaho has a city ordinance allowing robotics and self-driving cars within city limits. The hope is that this will encourage robotics research and the city will become a hub for the robotics industry.

    BLANK SLIDE

    A Challenging Environment

    Slide with various obstructions (power lines, traffic lights, construction detours, street signs, etc)

    But cities are messy places that make the safe operation of unmanned vehicles challenging. There are obstructions in the air and on the ground, changes in the environment that an autonomous vehicle must navigate, and of course the people that live there.

    The current experimental self-driving cars use sensors to detect obstructions and watch for traffic signals. Aerial vehicles do not have similar sensors yet. First they aren’t allowed to operate in populated areas. Second, the weight of additional sensors and the computation required places limits on their ability to fly. However, UAVs operate with a flight plan. Flight planning software can create that plan and could incorporate avoidance of known obstructions automatically. As the weight of sensors decrease, aerial vehicles will be able to sense their environment and avoid obstructions automatically.

    Just as Google Street View cars drove through our cities capturing images from the street, similar mapping vehicles could be used to collect information about the city environment to aid in vehicle navigation and avoiding known obstructions. That database could shared with vehicle operators to aid in navigation and flight planning.

    BLANK SLIDE

    Strategy for Integration

    Slide with Lafayette Skyline.

    State laws and city ordinances signal the start of an effort to integrate these technologies into our everyday lives. However, there is also a recognition that most of these technologies are still under development. They are not mature yet. It may take many years to get these technologies to a point of reliability and safety with which most people can be comfortable. Just as early cars and airplanes had to develop and evolve over many years, we are only at the beginning stages of the implementation and distribution of this technology.

    I propose that we need to have a strategy at the federal, state, and local levels for unmanned and autonomous vehicles. This strategy should consider all kinds of unmanned and autonomous vehicles and the environments in which they will operate.

    First, we need to have public debates and discussions on how these technologies can benefit society and address some longstanding problems. Safety will always be a prime concern. Privacy is already a concern for citizens and a reasonable use for the information collected by unmanned vehicles must be considered. We must balance this concern with the benefits of innovation to move us forward.

    Second, we need to embrace experimentation now rather than wait for the technology to mature first. The reason is simple. Developers need to operate in real environments in order to solve problems. It is not possible to simulate all situations in a laboratory setting or even on the sunny, well-mapped streets of California.

    Third, we need to create a legal framework that allows for the safe experimentation and operation of unmanned vehicles in populated areas. Our current frameworks define or assume that an operator is always in control of a vehicle. That may not always be case. We also need to provide a reasonable foundation in which new business models can develop. It is not always possible to predict how technology will be used nor should we try.

    My hope is that we can find a way to bring the benefits of unmanned vehicles to our city. And soon.

    Thank you.

  • Facebook Security: Watching Over Your Facebook Account Activity

    December 10th, 2012

    Monitoring your Facebook account for unusual activity is one of the best methods available to prevent attackers, spammers, and malicious people from taking over your account and causing trouble for you and your Facebook friends. Attackers want to get access to your Facebook account for a several reasons. If you are a public person, then you may have people that oppose your views. Sending messages from Facebook contrary to your stated position on an issue may confuse your followers and lead to personal difficulties and unnecessary confrontation. Attackers and spammers want to use your account to get to your Facebook friends. Specifically, they want to send messages to your Facebook Friends pretending to be you. Your Facebook Friends are more likely to trust posts and messages from your account. Attackers use your account to spread malicious software and links to your Facebook Friends. Spammers use your account to send unsolicited commercial messages or links to surveys. Regardless of what they send, you will have a difficult time explaining the messages sent from your account and assisting in the cleanup. Leaving your Facebook account logged in and abandoned is an opportunity for someone to mess around with your Facebook account settings, your profile, and send unflattering messages in your name.

    If you access Facebook from multiple devices like your home computer, your laptop, your tablet, your phone, a work computer, a friend’s computer, the library computer, the school computer, then you should be aware that you need to monitor your account for unusual activity. It’s quite easy to forget to logout of Facebook. Some less scrupulous individuals may have access to your account and can life miserable for you. Remember, just closing the tab in the browser or even exiting from the browser software will not log you out of Facebook. You have to select “Log Out” from the triangular drop down menu in the top right portion of the Facebook page.

    A button to allow websites to use the Facebook authentication system

    Using Facebook Apps allows the developers and owners of those applications to access to your account and some of your private information and Facebook Friends. The same is true for using “Login with Facebook” (sometimes called “Connect with Facebook”) on another web site. You have to allow those web sites and applications explicit access to your Facebook account and information. Facebook identifies which information they need to access so you can make a decision about the access prior to approving it. But over time, you may no longer use those applications or web sites. In some cases Facebook applications have been intentionally malicious or at least “noisy” in that they post status messages and annoy you and your Facebook Friends. Canceling the access of old, unused and malicious web sites and Facebook applications is prudent.

    Monitoring your Facebook account activity is very important to maintain the security of your account and to prevent unwanted access by others. Some of methods to maintain your account security involve enabling Facebook security features, reviewing your Facebook account status, and reviewing the applications you have previously approved access to your account.

    Facebook account Login Notifications provide an easy way to monitor your account and the devices used to access it. Login Notifications are useful in that you are immediately informed if your account is accessed from a new device without your knowledge. You can also assign a unique name to each device used to access your Facebook account for later review. Enabling this feature will keep you better informed about unauthorized access to your Facebook account and provide you with an easy method to review the approved devices later. To learn how to enable Login Notification for your Facebook account, please see my previous post on Login Notifications.

    Periodically you should review your list of approved devices, web sites, and applications. You may no longer have access to a particular device, borrowed someones’s device to access your account, or allowed access to a Facebook application then never used it again. There may be web sites that you signed into only once and never returned or no longer use. Facebook applications are easy to start using but are often forgotten. Reviewing your approved devices, web sites, and applications and canceling their access is available through the Security Settings page on Facebook.

    Monitoring Account Activity and Canceling Access

    Here is how to monitor your Facebook account and review the web sites, applications, and devices that have access to your account:

    1. Click on the “triangle” drop-down menu in the upper right portion of the Facebook page.
    2. Select “Account Settings”. A new page will open.
    3. On the upper left portion of the Facebook page you will see a tab called “Security” with a gold badge icon next to it. Click on it.
    4. If you have Login Notifications enabled, look for “Recognized Devices” and click on it. You will see a list of devices on which you have logged into your Facebook account. Review the list and click on the “Remove” link for each device for which you want to remove access. Click on “Save Changes”.
    5. To review from where your Facebook account has been accessed, select “Active Sessions”. A list of sessions will be presented. Review the list and click on the “End Activity” link to cancel access for a session. End any activity on sessions you don’t recognize.
    6. On the upper left portion of the Facebook page you will see a tab called “Apps”. Click on it. You will see a list of web sites and applications that you have authorized to access your Facebook account. For any web site or app that you are not familiar with or have not used in a while, you should remove it by clicking on the “X” icon to the right of the entry. You can also limit some of the access that the approved applications have by clicking on “Edit”. Some of the access that application originally requested can be curtailed by selecting “Remove”. You should remove access to any action that you do not believe that the application needs.
    The Facebook Account Settings for Facebook Apps

    Monitoring and Controlling Account Activity Considerations

    Using the Facebook-provided tools for monitoring and controlling access to your account can reduce the chances that someone can take over your Facebook account, but there are some things to remember when using these tools:

    1. The more computers you use, the longer your list of Active Sessions and Recognized Devices will be. Periodically, you should trim that list down to the specific systems that you use most often.
    2. Limiting the access a web site or application has may impact the usefulness of the of the application or web site. You can experiment and adjust the access as needed.
    3. If you remove access for a session or device that you were using, you will be asked to login to your Facebook account again when you use that device.

    Resources

    Check our guide: Own Your Space, “A Guide to Facebook Security”

    Facebook Extra Security Features

  • Facebook Security: Use Login Notifications to Watch for Unauthorized Access

    November 28th, 2012

    Sometimes you just need to borrow a computer to check Facebook. You may be in the school library or the computer lab. You may be at a friend’s house and want to show them a video or a post on Facebook. But can you trust the computer you are using? Does it have malware or a key stroke logger that can capture your username and password? How would you know? You may decide that the likelihood of this happening is pretty low. But what if you guessed wrong and some bad people have your account details. How would you know?

    If an attacker were able to get your Facebook account details, they may want to use your account in ways that wouldn’t expect. They may merely want your account to spread commercial messages (spam) to your Facebook Friends. They may have more malicious purposes and try to get your Friends to try out a malicious Facebook App. Since they have access to your account, they are pretending to be you. Your Facebook Friends might not be able to tell that it’s not you. Since these message appear to come from you, you will have the burden of resolving any problems caused. It is simply better to protect your account from unauthorized access and avoid the unpleasant aftermath from losing control of your account.

    Facebook provides two security tools that allow you to control access to your account from various devices. Login Approvals, which I covered in “Facebook Security: Using Login Approvals to keep bad guys out of your account“, sends a security code to you when your Facebook account logs in from a new computer or device. Login Notifications inform you when your Facebook account is used to login from a new, unrecognized device. Using these tools together, you can control your account access and to be informed when a new device is used to access it.

    Login Notifications inform you when your Facebook account is accessed by an unrecognized device. Whenever you log into your Facebook account from a new device, you will be asked to give it a name. Once you do, Facebook will send you a text message and/or an email message telling you that your account was accessed from a new computer or device. If you were the person accessing your account, then you can ignore the message. If, however, it is not you, then the email message contains a link that you can click to secure your account and prevent the other person from using your account. If you are logged into Facebook when an unrecognized device is used to access your account, you will see a notification on the page and a message in your Notification drop-down menu. The notifications will have links for you to review the login and cancel it, if needed.

    Enabling Login Notifications

    Setting up your Facebook Account to use the Login Notification system requires that you register your mobile phone with Facebook. To register your mobile phone, check out my article “Facebook Security: Register Your Mobile Phone to Use Advanced Security Features“. Once you have that configured, you can receive codes from Facebook when you need to log into a computer that you do not own.

    Setting up your Facebook Account to use the Facebook Login Approval system requires that you register your mobile phone with Facebook. Once you have that configured, you can request one-time passwords from Facebook when you need to log into a computer that you do not own.

    1. Click on the “triangle” drop-down menu in the upper right portion of the Facebook page.
    2. Select “Account Settings”. A new page will open.
    3. On the upper left portion of the Facebook page you will see a tab called “Security” with a gold badge icon next to it. Click on it.
    4. A list of security settings are presented. Look for “Login Notifications” and click on it.
    5. Select the methods by which you will be notified when your account logs into Facebook (email and text message) and click the “Save Changes” button.
    Facebook account settings for Login Notifications
    When you enable Login Notifications you may see a new window that describes some issues that may occur with the current configuration of your web browser. Review that information. You may need to make changes to your web browser configuration in order for Login Notifications to work well. The message from Facebook might also include some instructions on logging out of your account before Login Notifications begin to work.

    Login Notification Considerations

    Using the Facebook-provided tools for controlling access to your account can reduce the chances that someone can take over your Facebook account, but there are some things to remember when using these tools:

    1. With Login Notifications enabled for Email, you receive an email every time an unrecognized device is used to log into your Facebook account. If you suspect that someone is using your account without your knowledge, you can click the link in the email message to Secure Your Account. This will step you through the process of locking down your account to prevent misuse by others. If you enable text message notification only, there is no link in the message. You will need to log into Facebook and review the Active Sessions and remotely terminate access there.
    2. Facebook uses cookies to aid in recognizing computers and devices. If your web browsing is configured to delete cookies every time you quit the web browser software, then Facebook will attempt to approve your device every time you log into Facebook. You can either configure the web browser to not delete cookies when exiting or approve the device every time.
    3. Private browsing (or “Incognito Mode“) is a web browser mode that does not save cookies, your browsing history, and other web privacy related information. Accessing Facebook using a private browsing mode will require you to approve your device every time you log into Facebook. You can either avoid using private browsing or approve the device every time.
    4. If you are already logged into your Facebook account through a web browser, you will see a notification when your account is accessed from another computer or mobile device. From the Notifications drop-down menu you can cancel access to that device.
    Facebook Login Notification through the web browser.

    Resources

    Check our guide: Own Your Space, “A Guide to Facebook Security”

    Facebook Extra Security Features

  • Facebook Security: Using Login Approvals to keep bad guys out of your account

    November 15th, 2012

    UPDATE (November 28, 2012): Added a link to recent post on Facebook Login Notifications.

    If you want to stay in touch with your Facebook Friends throughout the day, sometimes you have to access your Facebook account using computers or mobile devices that you do not own. You may be a student and use the school’s computers. If you work in an office environment, your office computer might be the one you use. These devices can have malicious software that might capture your Facebook account username and password. Once an attacker, spammer, or malevolent person gets a hold of your Facebook account, they can make your life difficult by sending dangerous links or unsolicited commercial messages (spam) to your friends. Others may cause havoc for you personally by changing your status or profile, taunting and annoying your Facebook Friends, or sending obscene or hateful messages to other people. Since these message appear to come from you, you will have the burden of resolving the problems caused. It is better to protect your account from unauthorized access and avoid the unpleasant aftermath from losing control of your account.

    Facebook provides two security tools that allow you to control access to your account from various devices. Login Approvals are used when your Facebook account logs in from a different computer or device. A security code is sent to you via text message. Login Notifications, which I covered in “Facebook Security: Use Login Notifications to Watch for Unauthorized Access“, inform you when your Facebook account is used to login from a new, unrecognized device. Using these tools together, you can control your account access and to be informed when a new device is used to access it.

    Login Approvals work by sending you a text message to your registered mobile phone when you log into your Facebook account from a different computer or mobile device or from a different web browser. After your Facebook username and password are entered, Facebook sends you to a page where you are asked to enter your security code. Simultaneously, a text message is sent to your mobile phone. The text message contains a six-digit security code that you must enter on the web page. Once the security code is entered correctly, you will asked to create a name for the device. This allows you to assign a unique name that you can remember later when you review the devices you have previously approved. After that, you can use Facebook normally with the new computer or device. Someone with your Facebook account username and password will not be able to get your unique security code sent to your mobile phone, so they will not be able to access your Facebook account.

    Enabling Login Approvals

    Setting up your Facebook Account to use the Login Approval system requires that you register your mobile phone with Facebook. To register your mobile phone, check out my article “Facebook Security: Register Your Mobile Phone to Use Advanced Security Features“. Once you have that configured, you can receive codes from Facebook when you need to log into a computer that you do not own.

    1. Click on the “triangle” drop-down menu in the upper right portion of the Facebook page.
    2. Select “Account Settings”. A new page will open.
    3. On the upper left portion of the Facebook page you will see a tab called “Security” with a gold badge icon next to it. Click on it.
    4. A list of security settings are presented. Look for “Login Approvals” and click on it.
    5. Enable Login Approvals by selecting the checkbox. A window will open that describes Login Approvals and how it works. Click on the “Set Up Now” button to proceed.
    6. Facebook will send a text message to your mobile phone with a six-digit code. A window will open and ask you to enter the code you received. Enter the code and click “Submit”.
    7. Facebook will then ask you to name the computer you are using. This is your chance to choose a useful name that you can recognize later in a list of known devices. Choose a name for your computer, like “Home Computer” or “Work Laptop”, and click “Next”.
    8. Login Approvals are now enabled. A new window will open with some additional details and security warnings. These are important, so please read the information provided. Click “Next”.
    9. Another window will open and ask you to configure the Code Generator. I’ll cover the Code Generator in an upcoming article. For now, click “Not Now”.
    Facebook Account Settings showing that Login Approvals are configured.

    Logging into Facebook with Login Approvals

    When you have Login Approvals configured, you will be asked to enter a code each time you log into your Facebook account from a computer or device you have not used previously. In Facebook terms, this is an “unrecognized” computer or device. When you use a different device, Facebook wants to make sure that it really is you. To do this, the code is sent to your mobile phone, which is the one piece of equipment that you are likely to have with you at all times.

    Facebook Login requesting a Security Code

    When you log into Facebook, enter your username and password as usual. If they are correct, you will receive a text message on your phone from Facebook. Enter that code on the “Enter Security Code” web page. Once you enter the correct code, you will be ask to choose a name for the device. Choose a unique name that will allow you to remember the device you are using.

    If someone has been trying to log into your Facebook account but has not entered the correct code, Facebook will ask you to review those entries. This is your opportunity to see if your account is being targeted. In some cases, it might be you. You may have made a mistake will logging into your account. Review these attempts carefully though. It may mean that someone has your account password. While they didn’t get into your account, it might be a good time to change your password, just in case.

    Login Approval Considerations

    Using the Facebook extra security features like Login Approvals for controlling access to your account can reduce the chances that someone can take over your Facebook account, but there are some things to remember when using these tools:

    1. When you log into the Facebook mobile application, you will see a message indicating that a text message has been sent to your registered cell phone. Click “OK” and you will return to the login screen again. (You can exit the mobile application to retrieve the security code and then launch the mobile application again.) Enter the security code from the text message into the “Password” field. If entered correctly, you will be able to access Facebook through the mobile application. If you have Login Notifications enabled, you will also receive an email notifying you that your account was accessed on a mobile device.
    2. Facebook uses cookies to aid in recognizing computers and devices. If your web browsing is configured to delete cookies every time you quit the web browser software, then Facebook will attempt to approve your device every time you log into Facebook. You can either configure the web browser to not delete cookies when exiting or approve the device every time.
    3. Private browsing is a web browser mode that does not save cookies, your browsing, and other privacy related information. Accessing Facebook using a private browsing mode will require you to approve your device every time you log into Facebook. You can either avoid using private browsing or approve the device every time.
    4. If you lose your cell phone, you cannot receive the security code to log into your Facebook account from new devices. If this happens, you need to log into your Facebook account from a previously approved device, disable Login Approvals, and remove your cell phone from Facebook.
    5. If you delete your registered cell phone from Facebook, Login Approvals will be disabled automatically. An email will be sent indicating that it was turned off. You cannot use Login Approvals without a cell phone to receive the security code.
    6. You may need to create Facebook App Passwords for applications that cannot use Login Approvals. I will cover those in an upcoming article.

    Resources

    Check our guide: Own Your Space, “A Guide to Facebook Security”

    Facebook Extra Security Features

  • Mac OS X pf firewall: Avoiding known bad guys

    October 27th, 2012

    Apple Mac OS X has multiple firewall options. In this article, we will look at enabling the Mac OS X pf firewall and loading a list of IPs and networks that are known to host spammers, attackers, botnet command and control servers, and other undesirable actors on the Internet.

    (more…)

«Previous Page
1 … 3 4 5 6
Next Page»

Website Powered by WordPress.com.

 

Loading Comments...
 

    • Follow Following
      • ikawnoclastic thoughts
      • Already have a WordPress.com account? Log in now.
      • ikawnoclastic thoughts
      • Edit Site
      • Follow Following
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar