[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.52,0:00:05.64,Default,,0000,0000,0000,,I want you to travel back in time with me, Dialogue: 0,0:00:05.67,0:00:09.14,Default,,0000,0000,0000,,to the before time, to 2017. Dialogue: 0,0:00:09.17,0:00:10.89,Default,,0000,0000,0000,,I don't know if you can remember it, Dialogue: 0,0:00:10.92,0:00:12.81,Default,,0000,0000,0000,,dinosaurs were roaming the earth. Dialogue: 0,0:00:12.83,0:00:14.56,Default,,0000,0000,0000,,I was a security researcher, Dialogue: 0,0:00:14.58,0:00:17.35,Default,,0000,0000,0000,,I had spent about five or six years Dialogue: 0,0:00:17.38,0:00:20.43,Default,,0000,0000,0000,,doing research on the ways in which APTs, Dialogue: 0,0:00:20.46,0:00:24.83,Default,,0000,0000,0000,,which is short for advanced\Npersistent threats, Dialogue: 0,0:00:25.42,0:00:28.68,Default,,0000,0000,0000,,which stands for nation-state actors, Dialogue: 0,0:00:28.71,0:00:32.73,Default,,0000,0000,0000,,spy on journalists and activists Dialogue: 0,0:00:32.75,0:00:34.98,Default,,0000,0000,0000,,and lawyers and scientists Dialogue: 0,0:00:35.00,0:00:38.68,Default,,0000,0000,0000,,and just generally people\Nwho speak truth to power. Dialogue: 0,0:00:38.71,0:00:41.10,Default,,0000,0000,0000,,And I'd been doing this for a while Dialogue: 0,0:00:41.12,0:00:45.39,Default,,0000,0000,0000,,when I discovered\Nthat one of my fellow researchers, Dialogue: 0,0:00:45.42,0:00:48.14,Default,,0000,0000,0000,,with whom I had been\Ndoing this all this time, Dialogue: 0,0:00:48.17,0:00:53.21,Default,,0000,0000,0000,,was allegedly a serial rapist. Dialogue: 0,0:00:54.54,0:00:56.98,Default,,0000,0000,0000,,So the first thing that I did Dialogue: 0,0:00:57.00,0:00:59.98,Default,,0000,0000,0000,,was I read a bunch of articles about this. Dialogue: 0,0:01:00.00,0:01:03.02,Default,,0000,0000,0000,,And in January of 2018, Dialogue: 0,0:01:03.04,0:01:08.10,Default,,0000,0000,0000,,I read an article\Nwith some of his alleged victims. Dialogue: 0,0:01:08.12,0:01:12.23,Default,,0000,0000,0000,,And one of the things\Nthat really struck me about this article Dialogue: 0,0:01:12.25,0:01:14.06,Default,,0000,0000,0000,,is how scared they were. Dialogue: 0,0:01:14.08,0:01:15.77,Default,,0000,0000,0000,,They were really frightened, Dialogue: 0,0:01:15.79,0:01:20.93,Default,,0000,0000,0000,,they had, you know,\Ntape over the cameras on their phones Dialogue: 0,0:01:20.96,0:01:22.23,Default,,0000,0000,0000,,and on their laptops, Dialogue: 0,0:01:22.25,0:01:25.10,Default,,0000,0000,0000,,and what they were worried about\Nwas that he was a hacker Dialogue: 0,0:01:25.12,0:01:27.08,Default,,0000,0000,0000,,and he was going to hack into their stuff Dialogue: 0,0:01:27.10,0:01:29.27,Default,,0000,0000,0000,,and he was going to ruin their lives. Dialogue: 0,0:01:29.29,0:01:32.48,Default,,0000,0000,0000,,And this had kept them silent\Nfor a really long time. Dialogue: 0,0:01:32.50,0:01:35.58,Default,,0000,0000,0000,,So, I was furious. Dialogue: 0,0:01:37.38,0:01:40.89,Default,,0000,0000,0000,,And I didn't want anyone\Nto ever feel that way again. Dialogue: 0,0:01:40.92,0:01:43.81,Default,,0000,0000,0000,,So I did what I usually do when I'm angry: Dialogue: 0,0:01:43.83,0:01:45.10,Default,,0000,0000,0000,,I tweeted. Dialogue: 0,0:01:45.12,0:01:47.31,Default,,0000,0000,0000,,(Laughter) Dialogue: 0,0:01:47.33,0:01:48.77,Default,,0000,0000,0000,,And the thing that I tweeted Dialogue: 0,0:01:48.79,0:01:52.77,Default,,0000,0000,0000,,was that if you are a woman\Nwho has been sexually abused by a hacker Dialogue: 0,0:01:52.79,0:01:56.23,Default,,0000,0000,0000,,and that hacker has threatened\Nto break into your devices, Dialogue: 0,0:01:56.25,0:01:57.89,Default,,0000,0000,0000,,that you could contact me Dialogue: 0,0:01:57.92,0:01:59.81,Default,,0000,0000,0000,,and I would try to make sure Dialogue: 0,0:01:59.83,0:02:04.60,Default,,0000,0000,0000,,that your device got a full,\Nsort of, forensic look over. Dialogue: 0,0:02:04.62,0:02:07.10,Default,,0000,0000,0000,,And then I went to lunch. Dialogue: 0,0:02:07.12,0:02:08.71,Default,,0000,0000,0000,,(Laughter) Dialogue: 0,0:02:09.96,0:02:11.64,Default,,0000,0000,0000,,Ten thousand retweets later, Dialogue: 0,0:02:11.67,0:02:13.10,Default,,0000,0000,0000,,(Laughter) Dialogue: 0,0:02:13.12,0:02:16.54,Default,,0000,0000,0000,,I had accidentally started a project. Dialogue: 0,0:02:18.21,0:02:22.52,Default,,0000,0000,0000,,So every morning,\NI woke up and my mailbox was full. Dialogue: 0,0:02:22.54,0:02:28.35,Default,,0000,0000,0000,,It was full of the stories\Nof men and women Dialogue: 0,0:02:28.38,0:02:33.23,Default,,0000,0000,0000,,telling me the worst thing\Nthat had ever happened to them. Dialogue: 0,0:02:33.25,0:02:38.02,Default,,0000,0000,0000,,I was contacted by women\Nwho were being spied on by men, Dialogue: 0,0:02:38.04,0:02:40.27,Default,,0000,0000,0000,,by men who were being spied on by men, Dialogue: 0,0:02:40.29,0:02:42.39,Default,,0000,0000,0000,,by women who were being spied on by women, Dialogue: 0,0:02:42.42,0:02:44.98,Default,,0000,0000,0000,,but the vast majority\Nof the people contacting me Dialogue: 0,0:02:45.00,0:02:48.81,Default,,0000,0000,0000,,were women who had been\Nsexually abused by men Dialogue: 0,0:02:48.83,0:02:51.27,Default,,0000,0000,0000,,who were now spying on them. Dialogue: 0,0:02:51.29,0:02:53.10,Default,,0000,0000,0000,,The one particularly interesting case Dialogue: 0,0:02:53.12,0:02:55.14,Default,,0000,0000,0000,,involved a man who came to me, Dialogue: 0,0:02:55.17,0:03:00.27,Default,,0000,0000,0000,,because his boyfriend had outed him as gay Dialogue: 0,0:03:00.29,0:03:03.52,Default,,0000,0000,0000,,to his extremely\Nconservative Korean family. Dialogue: 0,0:03:03.54,0:03:08.67,Default,,0000,0000,0000,,So this is not just\Nmen-spying-on-women issue. Dialogue: 0,0:03:10.29,0:03:13.43,Default,,0000,0000,0000,,And I'm here to share Dialogue: 0,0:03:13.46,0:03:15.88,Default,,0000,0000,0000,,what I learned from this experience. Dialogue: 0,0:03:16.83,0:03:20.18,Default,,0000,0000,0000,,What I learned is that data leaks. Dialogue: 0,0:03:20.21,0:03:22.14,Default,,0000,0000,0000,,It's like water. Dialogue: 0,0:03:22.17,0:03:23.89,Default,,0000,0000,0000,,It gets in places you don't want it. Dialogue: 0,0:03:23.92,0:03:25.18,Default,,0000,0000,0000,,Human leaks. Dialogue: 0,0:03:25.21,0:03:27.35,Default,,0000,0000,0000,,Your friends give away\Ninformation about you. Dialogue: 0,0:03:27.38,0:03:30.27,Default,,0000,0000,0000,,Your family gives away\Ninformation about you. Dialogue: 0,0:03:30.29,0:03:31.56,Default,,0000,0000,0000,,You go to a party, Dialogue: 0,0:03:31.58,0:03:34.68,Default,,0000,0000,0000,,somebody tags you as having been there. Dialogue: 0,0:03:34.71,0:03:36.31,Default,,0000,0000,0000,,And this is one of the ways Dialogue: 0,0:03:36.33,0:03:38.48,Default,,0000,0000,0000,,in which abusers pick up\Ninformation about you Dialogue: 0,0:03:38.50,0:03:40.52,Default,,0000,0000,0000,,that you don't otherwise\Nwant them to know. Dialogue: 0,0:03:40.54,0:03:45.93,Default,,0000,0000,0000,,It is not uncommon for abusers\Nto go to friends and family Dialogue: 0,0:03:45.96,0:03:49.10,Default,,0000,0000,0000,,and ask for information\Nabout their victims Dialogue: 0,0:03:49.12,0:03:52.29,Default,,0000,0000,0000,,under the guise of being concerned\Nabout their "mental health." Dialogue: 0,0:03:53.25,0:03:56.48,Default,,0000,0000,0000,,A form of leak that I saw Dialogue: 0,0:03:56.50,0:03:59.93,Default,,0000,0000,0000,,was actually what we call\Naccount compromise. Dialogue: 0,0:03:59.96,0:04:02.89,Default,,0000,0000,0000,,So your Gmail account, Dialogue: 0,0:04:02.92,0:04:05.56,Default,,0000,0000,0000,,your Twitter account, Dialogue: 0,0:04:05.58,0:04:07.81,Default,,0000,0000,0000,,your Instagram account, Dialogue: 0,0:04:07.83,0:04:09.98,Default,,0000,0000,0000,,your iCloud, Dialogue: 0,0:04:10.00,0:04:11.64,Default,,0000,0000,0000,,your Apple ID, Dialogue: 0,0:04:11.67,0:04:13.27,Default,,0000,0000,0000,,your Netflix, your TikTok -- Dialogue: 0,0:04:13.29,0:04:15.12,Default,,0000,0000,0000,,I had to figure out what a TikTok was. Dialogue: 0,0:04:16.42,0:04:18.31,Default,,0000,0000,0000,,If it had a login, Dialogue: 0,0:04:18.33,0:04:21.10,Default,,0000,0000,0000,,I saw it compromised. Dialogue: 0,0:04:21.12,0:04:25.77,Default,,0000,0000,0000,,And the reason for that is because\Nyour abuser is not always your abuser. Dialogue: 0,0:04:25.79,0:04:30.23,Default,,0000,0000,0000,,It is really common for people\Nin relationships to share passwords. Dialogue: 0,0:04:30.25,0:04:32.85,Default,,0000,0000,0000,,Furthermore, people who are intimate, Dialogue: 0,0:04:32.88,0:04:34.43,Default,,0000,0000,0000,,who know a lot about each other, Dialogue: 0,0:04:34.46,0:04:36.48,Default,,0000,0000,0000,,can guess each other's security questions. Dialogue: 0,0:04:36.50,0:04:38.56,Default,,0000,0000,0000,,Or they can look over\Neach other's shoulders Dialogue: 0,0:04:38.58,0:04:41.56,Default,,0000,0000,0000,,to see what code they're using\Nin order to lock their phones. Dialogue: 0,0:04:41.58,0:04:44.23,Default,,0000,0000,0000,,They frequently have\Nphysical access to the phone, Dialogue: 0,0:04:44.25,0:04:46.98,Default,,0000,0000,0000,,or they have physical access\Nto the laptop. Dialogue: 0,0:04:47.00,0:04:50.98,Default,,0000,0000,0000,,And this gives them a lot of opportunity Dialogue: 0,0:04:51.00,0:04:54.31,Default,,0000,0000,0000,,to do things to people's accounts, Dialogue: 0,0:04:54.33,0:04:56.14,Default,,0000,0000,0000,,which is very dangerous. Dialogue: 0,0:04:56.17,0:04:59.10,Default,,0000,0000,0000,,The good news is that we have advice Dialogue: 0,0:04:59.12,0:05:01.43,Default,,0000,0000,0000,,for people to lock down their accounts. Dialogue: 0,0:05:01.46,0:05:05.43,Default,,0000,0000,0000,,This advice already exists,\Nand it comes down to this: Dialogue: 0,0:05:05.46,0:05:10.29,Default,,0000,0000,0000,,Use strong, unique passwords\Nfor all of your accounts. Dialogue: 0,0:05:11.54,0:05:14.77,Default,,0000,0000,0000,,Use more strong, unique passwords Dialogue: 0,0:05:14.79,0:05:18.02,Default,,0000,0000,0000,,as the answers to your security questions, Dialogue: 0,0:05:18.04,0:05:21.89,Default,,0000,0000,0000,,so that somebody who knows\Nthe name of your childhood pet Dialogue: 0,0:05:21.92,0:05:23.54,Default,,0000,0000,0000,,can't reset your password. Dialogue: 0,0:05:24.54,0:05:29.02,Default,,0000,0000,0000,,And finally, turn on the highest level\Nof two-factor authentication Dialogue: 0,0:05:29.04,0:05:31.18,Default,,0000,0000,0000,,that you're comfortable using. Dialogue: 0,0:05:31.21,0:05:35.23,Default,,0000,0000,0000,,So that even if an abuser\Nmanages to steal your password, Dialogue: 0,0:05:35.25,0:05:37.31,Default,,0000,0000,0000,,because they don't have the second factor, Dialogue: 0,0:05:37.33,0:05:40.06,Default,,0000,0000,0000,,they will not be able\Nto log into your account. Dialogue: 0,0:05:40.08,0:05:42.27,Default,,0000,0000,0000,,The other thing that you should do Dialogue: 0,0:05:42.29,0:05:47.68,Default,,0000,0000,0000,,is you should take a look\Nat the security and privacy tabs Dialogue: 0,0:05:47.71,0:05:49.02,Default,,0000,0000,0000,,for most of your accounts. Dialogue: 0,0:05:49.04,0:05:51.27,Default,,0000,0000,0000,,Most accounts have\Na security or privacy tab Dialogue: 0,0:05:51.29,0:05:55.39,Default,,0000,0000,0000,,that tells you\Nwhat devices are logging in, Dialogue: 0,0:05:55.42,0:05:58.06,Default,,0000,0000,0000,,and it tells you where\Nthey're logging in from. Dialogue: 0,0:05:58.08,0:05:59.60,Default,,0000,0000,0000,,For example, here I am, Dialogue: 0,0:05:59.62,0:06:01.68,Default,,0000,0000,0000,,logging in to Facebook from the La Quinta, Dialogue: 0,0:06:01.71,0:06:03.28,Default,,0000,0000,0000,,where we are having this meeting, Dialogue: 0,0:06:03.30,0:06:05.27,Default,,0000,0000,0000,,and if for example, Dialogue: 0,0:06:05.29,0:06:07.56,Default,,0000,0000,0000,,I took a look at my Facebook logins Dialogue: 0,0:06:07.58,0:06:10.18,Default,,0000,0000,0000,,and I saw somebody logging in from Dubai, Dialogue: 0,0:06:10.21,0:06:12.18,Default,,0000,0000,0000,,I would find that suspicious, Dialogue: 0,0:06:12.21,0:06:14.83,Default,,0000,0000,0000,,because I have not been\Nto Dubai in some time. Dialogue: 0,0:06:16.12,0:06:19.02,Default,,0000,0000,0000,,But sometimes, it really is a RAT. Dialogue: 0,0:06:19.04,0:06:22.14,Default,,0000,0000,0000,,If by RAT you mean remote access tool. Dialogue: 0,0:06:22.17,0:06:25.23,Default,,0000,0000,0000,,And remote access tool Dialogue: 0,0:06:25.25,0:06:29.93,Default,,0000,0000,0000,,is essentially what we mean\Nwhen we say stalkerware. Dialogue: 0,0:06:29.96,0:06:33.64,Default,,0000,0000,0000,,So one of the reasons why\Ngetting full access to your device Dialogue: 0,0:06:33.67,0:06:35.98,Default,,0000,0000,0000,,is really tempting for governments Dialogue: 0,0:06:36.00,0:06:38.89,Default,,0000,0000,0000,,is the same reason why\Ngetting full access to your device Dialogue: 0,0:06:38.92,0:06:44.00,Default,,0000,0000,0000,,is tempting for abusive partners\Nand former partners. Dialogue: 0,0:06:45.04,0:06:49.14,Default,,0000,0000,0000,,We carry tracking devices\Naround in our pockets all day long. Dialogue: 0,0:06:49.17,0:06:52.81,Default,,0000,0000,0000,,We carry devices\Nthat contain all of our passwords, Dialogue: 0,0:06:52.83,0:06:55.18,Default,,0000,0000,0000,,all of our communications, Dialogue: 0,0:06:55.21,0:06:57.85,Default,,0000,0000,0000,,including our end-to-end\Nencrypted communications. Dialogue: 0,0:06:57.88,0:07:01.10,Default,,0000,0000,0000,,All of our emails, all of our contacts, Dialogue: 0,0:07:01.12,0:07:04.73,Default,,0000,0000,0000,,all of our selfies are all in one place, Dialogue: 0,0:07:04.75,0:07:08.27,Default,,0000,0000,0000,,often our financial information\Nis also in this place. Dialogue: 0,0:07:08.29,0:07:11.39,Default,,0000,0000,0000,,And so, full access to a person’s phone Dialogue: 0,0:07:11.42,0:07:15.54,Default,,0000,0000,0000,,is the next best thing\Nto full access to a person's mind. Dialogue: 0,0:07:16.38,0:07:21.56,Default,,0000,0000,0000,,And what stalkerware does\Nis it gives you this access. Dialogue: 0,0:07:21.58,0:07:25.56,Default,,0000,0000,0000,,So, you may ask, how does it work? Dialogue: 0,0:07:25.58,0:07:27.18,Default,,0000,0000,0000,,The way stalkerware works Dialogue: 0,0:07:27.21,0:07:30.93,Default,,0000,0000,0000,,is that it's a commercially\Navailable program, Dialogue: 0,0:07:30.96,0:07:34.48,Default,,0000,0000,0000,,which an abuser purchases, Dialogue: 0,0:07:34.50,0:07:37.48,Default,,0000,0000,0000,,installs on the device\Nthat they want to spy on, Dialogue: 0,0:07:37.50,0:07:39.48,Default,,0000,0000,0000,,usually because they have physical access Dialogue: 0,0:07:39.50,0:07:44.81,Default,,0000,0000,0000,,or they can trick their target\Ninto installing it themselves, Dialogue: 0,0:07:44.83,0:07:46.10,Default,,0000,0000,0000,,by saying, you know, Dialogue: 0,0:07:46.12,0:07:49.81,Default,,0000,0000,0000,,"This is a very important program\Nyou should install on your device." Dialogue: 0,0:07:49.83,0:07:54.10,Default,,0000,0000,0000,,And then they pay the stalkerware company Dialogue: 0,0:07:54.12,0:07:56.89,Default,,0000,0000,0000,,for access to a portal, Dialogue: 0,0:07:56.92,0:08:00.18,Default,,0000,0000,0000,,which gives them all\Nof the information from that device. Dialogue: 0,0:08:00.21,0:08:03.56,Default,,0000,0000,0000,,And you're usually paying\Nsomething like 40 bucks a month. Dialogue: 0,0:08:03.58,0:08:07.04,Default,,0000,0000,0000,,So this kind of spying\Nis remarkably cheap. Dialogue: 0,0:08:09.88,0:08:11.48,Default,,0000,0000,0000,,Do these companies know Dialogue: 0,0:08:11.50,0:08:16.23,Default,,0000,0000,0000,,that their tools Dialogue: 0,0:08:16.25,0:08:18.68,Default,,0000,0000,0000,,are being used as tools of abuse? Dialogue: 0,0:08:18.71,0:08:19.98,Default,,0000,0000,0000,,Absolutely. Dialogue: 0,0:08:20.00,0:08:22.81,Default,,0000,0000,0000,,If you take a look\Nat the marketing copy for Cocospy, Dialogue: 0,0:08:22.83,0:08:24.35,Default,,0000,0000,0000,,which is one of these products, Dialogue: 0,0:08:24.38,0:08:27.52,Default,,0000,0000,0000,,it says right there on the website Dialogue: 0,0:08:27.54,0:08:31.35,Default,,0000,0000,0000,,that Cocospy allows you\Nto spy on your wife with ease, Dialogue: 0,0:08:31.38,0:08:33.60,Default,,0000,0000,0000,,"You do not have to worry\Nabout where she goes, Dialogue: 0,0:08:33.62,0:08:36.56,Default,,0000,0000,0000,,who she talks to\Nor what websites she visits." Dialogue: 0,0:08:36.58,0:08:37.83,Default,,0000,0000,0000,,So that's creepy. Dialogue: 0,0:08:38.58,0:08:42.14,Default,,0000,0000,0000,,HelloSpy, which is another such product, Dialogue: 0,0:08:42.17,0:08:46.81,Default,,0000,0000,0000,,had a marketing page\Nin which they spent most of their copy Dialogue: 0,0:08:46.83,0:08:48.81,Default,,0000,0000,0000,,talking about the prevalence of cheating Dialogue: 0,0:08:48.83,0:08:51.52,Default,,0000,0000,0000,,and how important it is\Nto catch your partner cheating, Dialogue: 0,0:08:51.54,0:08:54.56,Default,,0000,0000,0000,,including this fine picture of a man Dialogue: 0,0:08:54.58,0:08:57.06,Default,,0000,0000,0000,,who has clearly just caught\Nhis partner cheating Dialogue: 0,0:08:57.08,0:08:58.35,Default,,0000,0000,0000,,and has beaten her. Dialogue: 0,0:08:58.38,0:09:00.89,Default,,0000,0000,0000,,She has a black eye,\Nthere is blood on her face. Dialogue: 0,0:09:00.92,0:09:05.02,Default,,0000,0000,0000,,And I don't think that there is\Nreally a lot of question Dialogue: 0,0:09:05.04,0:09:09.93,Default,,0000,0000,0000,,about whose side HelloSpy is on\Nin this particular case. Dialogue: 0,0:09:09.96,0:09:12.50,Default,,0000,0000,0000,,And who they're trying to sell\Ntheir product to. Dialogue: 0,0:09:14.62,0:09:20.60,Default,,0000,0000,0000,,It turns out that if you have stalkerware\Non your computer or on your phone, Dialogue: 0,0:09:20.62,0:09:24.64,Default,,0000,0000,0000,,it can be really difficult to know\Nwhether or not it's there. Dialogue: 0,0:09:24.67,0:09:26.23,Default,,0000,0000,0000,,And one of the reasons for that Dialogue: 0,0:09:26.25,0:09:28.85,Default,,0000,0000,0000,,is because antivirus companies Dialogue: 0,0:09:28.88,0:09:35.48,Default,,0000,0000,0000,,often don't recognize\Nstalkerware as malicious. Dialogue: 0,0:09:35.50,0:09:37.77,Default,,0000,0000,0000,,They don't recognize it as a Trojan Dialogue: 0,0:09:37.79,0:09:40.85,Default,,0000,0000,0000,,or as any of the other stuff\Nthat you would normally find Dialogue: 0,0:09:40.88,0:09:42.39,Default,,0000,0000,0000,,that they would warn you about. Dialogue: 0,0:09:42.42,0:09:46.23,Default,,0000,0000,0000,,These are some results\Nfrom earlier this year from VirusTotal. Dialogue: 0,0:09:46.25,0:09:48.93,Default,,0000,0000,0000,,I think that for one sample\Nthat I looked at Dialogue: 0,0:09:48.96,0:09:53.64,Default,,0000,0000,0000,,I had something like\Na result of seven out of 60 Dialogue: 0,0:09:53.67,0:09:57.06,Default,,0000,0000,0000,,of the platforms recognized\Nthe stalkerware that I was testing. Dialogue: 0,0:09:57.08,0:10:00.56,Default,,0000,0000,0000,,And here is another one\Nwhere I managed to get 10, Dialogue: 0,0:10:00.58,0:10:02.23,Default,,0000,0000,0000,,10 out of 61. Dialogue: 0,0:10:02.25,0:10:05.96,Default,,0000,0000,0000,,So this is still some very bad results. Dialogue: 0,0:10:07.50,0:10:11.35,Default,,0000,0000,0000,,I have managed to convince\Na couple of antivirus companies Dialogue: 0,0:10:11.38,0:10:14.52,Default,,0000,0000,0000,,to start marking stalkerware as malicious. Dialogue: 0,0:10:14.54,0:10:15.81,Default,,0000,0000,0000,,So that all you have to do Dialogue: 0,0:10:15.83,0:10:18.60,Default,,0000,0000,0000,,if you're worried about having\Nthis stuff on your computer Dialogue: 0,0:10:18.62,0:10:21.68,Default,,0000,0000,0000,,is you download the program, Dialogue: 0,0:10:21.71,0:10:24.10,Default,,0000,0000,0000,,you run a scan and it tells you Dialogue: 0,0:10:24.12,0:10:27.77,Default,,0000,0000,0000,,"Hey, there's some potentially\Nunwanted program on your device." Dialogue: 0,0:10:27.79,0:10:30.10,Default,,0000,0000,0000,,It gives you the option of removing it, Dialogue: 0,0:10:30.12,0:10:32.06,Default,,0000,0000,0000,,but it does not remove it automatically. Dialogue: 0,0:10:32.08,0:10:33.60,Default,,0000,0000,0000,,And one of the reasons for that Dialogue: 0,0:10:33.62,0:10:35.52,Default,,0000,0000,0000,,is because of the way that abuse works. Dialogue: 0,0:10:35.54,0:10:38.77,Default,,0000,0000,0000,,Frequently, victims of abuse aren't sure Dialogue: 0,0:10:38.79,0:10:41.27,Default,,0000,0000,0000,,whether or not they want\Nto tip off their abuser Dialogue: 0,0:10:41.29,0:10:43.06,Default,,0000,0000,0000,,by cutting off their access. Dialogue: 0,0:10:43.08,0:10:49.18,Default,,0000,0000,0000,,Or they're worried that their abuser\Nis going to escalate to violence Dialogue: 0,0:10:49.21,0:10:51.52,Default,,0000,0000,0000,,or perhaps even greater violence Dialogue: 0,0:10:51.54,0:10:54.08,Default,,0000,0000,0000,,than they've already been engaging in. Dialogue: 0,0:10:55.92,0:10:58.14,Default,,0000,0000,0000,,Kaspersky was one\Nof the very first companies Dialogue: 0,0:10:58.17,0:11:01.43,Default,,0000,0000,0000,,that said that they were going to start\Ntaking this seriously. Dialogue: 0,0:11:01.46,0:11:04.56,Default,,0000,0000,0000,,And in November of this year, Dialogue: 0,0:11:04.58,0:11:06.64,Default,,0000,0000,0000,,they issued a report in which they said Dialogue: 0,0:11:06.67,0:11:11.02,Default,,0000,0000,0000,,that since they started tracking\Nstalkerware among their users Dialogue: 0,0:11:11.04,0:11:15.88,Default,,0000,0000,0000,,that they had seen\Nan increase of 35 percent. Dialogue: 0,0:11:17.71,0:11:20.89,Default,,0000,0000,0000,,Likewise, Lookout came out\Nwith a statement Dialogue: 0,0:11:20.92,0:11:24.06,Default,,0000,0000,0000,,saying that they were going to take this\Nmuch more seriously. Dialogue: 0,0:11:24.08,0:11:28.77,Default,,0000,0000,0000,,And finally, a company called Malwarebytes\Nalso put out such a statement Dialogue: 0,0:11:28.79,0:11:33.31,Default,,0000,0000,0000,,and said that they had found\N2,500 programs Dialogue: 0,0:11:33.33,0:11:35.23,Default,,0000,0000,0000,,in the time that they had been looking, Dialogue: 0,0:11:35.25,0:11:37.50,Default,,0000,0000,0000,,which could be classified as stalkerware. Dialogue: 0,0:11:38.88,0:11:44.68,Default,,0000,0000,0000,,Finally, in November\NI helped to launch a coalition Dialogue: 0,0:11:44.71,0:11:47.77,Default,,0000,0000,0000,,called the Coalition Against Stalkerware, Dialogue: 0,0:11:47.79,0:11:52.18,Default,,0000,0000,0000,,made up of academics, Dialogue: 0,0:11:52.21,0:11:55.31,Default,,0000,0000,0000,,people who are doing\Nthis sort of thing on the ground -- Dialogue: 0,0:11:55.33,0:12:01.64,Default,,0000,0000,0000,,the practitioners of helping people to\Nescape from intimate partner violence -- Dialogue: 0,0:12:01.67,0:12:04.06,Default,,0000,0000,0000,,and antivirus companies. Dialogue: 0,0:12:04.08,0:12:09.73,Default,,0000,0000,0000,,And our goal is both to educate people\Nabout these programs, Dialogue: 0,0:12:09.75,0:12:13.23,Default,,0000,0000,0000,,but also to convince\Nthe antivirus companies Dialogue: 0,0:12:13.25,0:12:14.93,Default,,0000,0000,0000,,to change the norm Dialogue: 0,0:12:14.96,0:12:20.27,Default,,0000,0000,0000,,in how they act around\Nthis very scary software, Dialogue: 0,0:12:20.29,0:12:23.02,Default,,0000,0000,0000,,so that soon, if I get up in front of you Dialogue: 0,0:12:23.04,0:12:25.31,Default,,0000,0000,0000,,and I talk to you about this next year, Dialogue: 0,0:12:25.33,0:12:28.14,Default,,0000,0000,0000,,I could tell you that the problem\Nhas been solved, Dialogue: 0,0:12:28.17,0:12:30.89,Default,,0000,0000,0000,,and all you have to do\Nis download any antivirus Dialogue: 0,0:12:30.92,0:12:35.06,Default,,0000,0000,0000,,and it is considered normal\Nfor it to detect stalkerware. Dialogue: 0,0:12:35.08,0:12:36.89,Default,,0000,0000,0000,,That is my hope. Dialogue: 0,0:12:36.92,0:12:38.23,Default,,0000,0000,0000,,Thank you very much. Dialogue: 0,0:12:38.25,0:12:43.25,Default,,0000,0000,0000,,(Applause)