{"id":5511,"date":"2012-07-26T03:15:42","date_gmt":"2012-07-26T08:15:42","guid":{"rendered":"http:\/\/polarbear60.org\/randr\/?p=5511"},"modified":"2023-03-28T09:19:09","modified_gmt":"2023-03-28T14:19:09","slug":"tech-privacy","status":"publish","type":"post","link":"https:\/\/jeanschara.com\/pmtoo\/tech-privacy\/","title":{"rendered":"Tech: Privacy?"},"content":{"rendered":"<p>Peter Maass and Megha Rajagopalan wrote a piece for The New York Times Sunday Review Opinion pages about Smartphones being tracking devices.\u00a0 Cell phone location services have become very refined in recent years.\u00a0 Phone service providers can tell where you are with nearly pinpoint accuracy.\u00a0 As the article says, if they can determine where you are, they can surmise what you are doing. You may wonder, &#8220;Why would the phone company care where I am or what I am doing?&#8221; The phone company may or may not care to mine this information for product sales pitches or selling your information to targeted mailing lists. But they do give your information to law enforcement, increasingly without insisting upon the law enforcement agency providing a search warrant. And when they do insist on a search warrant, the process has become very streamlined, somewhat understandably for rapid response in identifying true terrorists operating on our soil.<\/p>\n<p>The other consideration, separate from location data, is the sheer volume of data about you and your activities that is maintained on your smartphone, and law enforcement has routinely exercised what they consider their right to confiscate your cell phone and sift it for information&#8211;without a warrant.<\/p>\n<p>If someone has information about where you were, coupled with your friends&#8217; information, not only can they determine where you have been, but they can predict where you are likely to be in the future. That doesn&#8217;t creep you out?<\/p>\n<p>Okay.\u00a0 They can also determine if you are likely to be a heavy drinker, spend a lot of time at church, sneak out on your spouse, spend a lot of time supporting a particular political candidate, or maybe you&#8217;re getting a certain type of medical treatment. You might not mind sharing that information, but aren&#8217;t you concerned about who might want to analyze that information about you?<\/p>\n<p>Then there are all the apps that want your cell phone number for &#8220;security&#8221; and easy access if your account is compromised. Once they tie all the information from Facebook, Twitter, Pinterest, and any number of other sites together with your location data, they can tell, perhaps, if you are truthful &#8212; is what you&#8217;re saying on social networks consistent with your location data?<\/p>\n<p>Some people say they don&#8217;t worry about it, because they don&#8217;t do anything wrong.\u00a0 That&#8217;s not the point.<\/p>\n<p>What happens when the aggregated data presents an inaccurate picture? What happens when the definition of &#8220;wrong&#8221; changes? A couple years ago, our Director of Homeland Security made some chilling\u00a0 conjectures.\u00a0 She intimated internal threats to national security could be from members of the Tea Party or disgruntled veterans. Members of the Tea Party peacefully protest the direction government has been taking over the last few years and work within the system to bring about change more in line with the Constitution.\u00a0 Veterans were included in that list, presumably because they are familiar with how weapons work.\u00a0 I&#8217;m not a member of the Tea Party, but I am a veteran.\u00a0 Most veterans take their oath of enlistment or commissioning seriously, and that oath says we will &#8220;protect the Constitution against all enemies, foreign and domestic.&#8221;\u00a0 Is the Department of Homeland Security afraid veterans will be protecting the Constitution for domestic enemies, implying they are afraid veterans will be thinking their government has become the enemy?\u00a0 If not, why would they be considering us as threads?\u00a0 Yes, there are the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Timothy_McVeigh\" target=\"_blank\" rel=\"noopener noreferrer\">Timothy McVeigh types<\/a>. They are a risk, but to single them out in a Homeland Security report, I would have to guess they are afraid there are a lot of veterans who are likely to take the approach McVeigh chose.<\/p>\n<p>I recently renewed my driver license, and I had the option of having my veteran status identified on the license.\u00a0 I chose not to exercise that right, because I&#8217;m not certain how it might be used in the future.\u00a0 Perhaps that was silly, because I have Disabled Veteran license plates, so the identifying information is already prominently displayed.<\/p>\n<p>There are also more moderate misuses of data aggregation.\u00a0 We recently received a solicitation for one of those extended warranty deals for a truck my husband purchased in 2006 that we have not owned since 2009. There&#8217;s nothing wrong with that (except for very outdated data), but the solicitation arrived addressed to his ex-wife.\u00a0 They were divorced in 1987, and her name, hopefully obviously, was not in any way associated with the purchase of that truck.\u00a0 How did that juxtaposition happen?\u00a0 It probably happened the same way we receive solicitations for discounts on luxury vehicles in his daughter&#8217;s name.\u00a0 What&#8217;s the common denominator?\u00a0 His USAA number from when he was married to his ex-wife. (Thank you, USAA for selling this information.) I wonder if his ex-wife gets solicitations in my name. If so, she must REALLY be puzzled. Alternatively, my husband&#8217;s father died in 1999.\u00a0 Hubby was the executor of the estate. To facilitate closing out the estate, he had his father&#8217;s mailing address changed to our house. In the process, some of his father&#8217;s wife&#8217;s mail (junk mail, typically) began arriving at the house.\u00a0 Just last week, we got a Bed Bath and Beyond flier. We don&#8217;t know how much junk mail is arriving for his father, because they have the same first name and middle initial (different middle names, so he isn&#8217;t a junior), but his father&#8217;s wife has never lived here, nor did we have her mail changed to this address (presumably, it was changed to her daughter&#8217;s house, where she moved after her husband died).\u00a0 With all this data collation, who is trying to make sure anything is accurate?<\/p>\n<p>For a hypothetical situation. What if you are innocently attending your Thursday night Canasta game, and, unbeknownst to you, local authorities have concluded that Canasta players are really a subversive group (because, really, who plays Canasta these days?) plotting to overthrow the government. Police raid your game, one of your group members reaches into her purse for her cell phone and brandishes it to tell the officers what a mistake they are making as she prepares to call and complain.\u00a0 The officers, believing this is a subversive group who may be dangerous, have itchy trigger fingers and blow your entire &#8220;splinter cell&#8221; group away in an epic one-sided gun battle &#8212; only to discover you were all unarmed and really were playing Canasta.\u00a0 But the government doesn&#8217;t want that information to get out, so you, who are no longer there to defend yourselves, become a subversive group.\u00a0 That goes into the news report, and everyone in town is on edge because sleeper cells are in their midst.<\/p>\n<p>Sure, that&#8217;s far-fetched for what we believe is possible, but it&#8217;s not far-fetched in a topsy-turvey world where the &#8220;enemy&#8221; has been defined to include what used to be considered model, loyal citizens.\u00a0 What information you choose to provide matters.\u00a0 Companies trying to make it &#8220;easy&#8221; for you to access everything are not necessarily doing it for your convenience.\u00a0 Finally, if you use your Facebook login (or any other similar account &#8212; Twitter could result in the same problem) for everything, are you prepared to lose access to every place you go if Facebook shuts down your account?\u00a0 They do that sometimes.\u00a0 I friend of mine (someone I know in real life) had her page shut down by Facebook after it was hacked and truly disgusting photos were posted.\u00a0 Photos she would NEVER have posted. People who knew her, thinking they were helping, reported the photos as spam.\u00a0 Facebook shut the account down.\u00a0 Two weeks later, she was able to convince Facebook she was the victim, and Facebook reactivated her now vacant account.\u00a0 None of her Friends were there, and she was using it as a working author, so she didn&#8217;t have a full list of everyone she&#8217;d friended to be able to contact them to let them know what happened.\u00a0 She chose to close the account and not use Facebook for any reason.\u00a0 After I saw that and realized the implications of using Facebook login at other sites, I disassociated myself from the few accounts where I&#8217;d allowed that to be activated.\u00a0 If you haven&#8217;t considered the implications for you of this possibility, I urge you to do so and act accordingly.<\/p>\n<p>This is a &#8220;Wild West&#8221; time for privacy on the internet, but once your personal data is out there for all to gather and use, you can&#8217;t get it back.\u00a0 If you delete something from the internet, there&#8217;s a very good chance it&#8217;s cached somewhere and can still be found.\u00a0 So far, the approaches the government has been trying to take have been draconian and not conducive to a freely accessible internet.\u00a0 The decisions made in the next few years will matter, and you owe it to yourself to follow the subject and look for possible implications for your life as well as learn to avoid pitfalls that exist.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Peter Maass and Megha Rajagopalan wrote a piece for The New York Times Sunday Review Opinion pages about Smartphones being tracking devices.\u00a0 Cell phone location services have become very refined in recent years.\u00a0 Phone service providers can tell where you are with nearly pinpoint accuracy.\u00a0 As the article says, if <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/jeanschara.com\/pmtoo\/tech-privacy\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[64],"tags":[],"class_list":["post-5511","post","type-post","status-publish","format-standard","hentry","category-tech-stuff"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/posts\/5511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/comments?post=5511"}],"version-history":[{"count":2,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/posts\/5511\/revisions"}],"predecessor-version":[{"id":15334,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/posts\/5511\/revisions\/15334"}],"wp:attachment":[{"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/media?parent=5511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/categories?post=5511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jeanschara.com\/pmtoo\/wp-json\/wp\/v2\/tags?post=5511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}