13 Comments

Summary:

Conspiracy theorists might just be onto something after all. As we open up our homes and wallets to electronic devices, we’re also opening up our lives to surveillance. So before you head to the mall, hop in your car, fire up Facebook or pose for your drivers license photo, consider who might be watching. Continue Reading

I’ve spent a considerable amount of my personal and professional time mocking conspiracy theorists, but it is true that as we open our homes and our wallets to electronic devices, we are also opening up our lives to surveillance. So if you plan on doing something risky, read the list below. Then then check out your ISP’s terms of service, wrap your phone in tinfoil, and call a cab (leave your wallet at home).

  1. Mall Watchers: Like mall walkers, mall watchers aren’t so much evil as they are annoying. A firm called Path Intelligence isn’t tracking YOU, it’s tracking your particular cell phone — everything else is anonymous. Except for the country you live in. Because such data is helpful to mall owners and marketers who want to see where that cell phone travels inside their buildings. And we love to help them out, right?
  2. Web Stalkers: Already vilified in England and under investigation in Canada, these programs track your web surfing habits (again, not you, just anonymous data) and sell ads based on that data. And now the evils of deep-packet inspection have landed stateside, with Charter offering tracking to subscribers as an “enhanced service.”
  3. Location-Based Services/Advertising: Ever issued the little white lie to your boss or significant other, like saying you’re home sick when you’re waiting in line for tickets to the latest “Indiana Jones” flick? Thanks to the combination of location-based services delivered via cell phone and social networks, you may find yourself caught or at least having to prepare a bit before you tell your tale.
  4. Automotive black boxes: These services, which began with On-Star, are now so advanced they can track whether or not you (or someone with your ID chip) are driving the car. The boxes are not only outfitted with GPS chips that can be used to track where you are if the car gets in an accident, but contain hardware to disable a car in case of a theft. The boxes are tied to police systems, which means it’s easy enough for governments to track the car at any time. I wonder how long route data is stored.
  5. Digital IDs: And for those of you who walk to work, don’t own a cell phone and refuse broadband service, there’s still your driver’s license or work-issued identity card, which can contain a chip that holds the key to your identity and can broadcast your data to anyone with the equipment to read it.
  1. [...] has a list called 5 Ways Your Gadgets Will Betray Your Privacy, which should reinforce the idea that you can pretty much be followed unless you move off the grid. [...]

    Share
  2. Lead wallets, anyone?

    Share
  3. martin.musculus Monday, May 19, 2008

    As I told my wife — forget to pay a few parking tickets? Your car is disabled… coutesy of OnStar(tm)!

    - musculus

    Share
  4. Just wait till we get RFID tags put in all our heads!

    Share
  5. I’ve heard you can disable those phone trackers but keeping your phone shut off. Is this true? Or does it still emit a signal that can be picked up by marketers?

    Share
  6. Stacey Higginbotham Tuesday, May 20, 2008

    @Liz, if the phone is off it’s not communicating with the cell towers so yes that should work.

    Share
  7. Very nice list and absolutely correct, but far from comprehensive, of course.
    As it stands, your every step is being monitored, stored, gauged and compared by what’s justifiably termed “Big Brother” forces these days. Time for a rethink and a restructuring of your behavioral strategies if you don’t want to end up as cannon fodder in the war for “security” the nanny state and all the corporate powers profiting therefrom is waging on us all.

    Share
  8. jack waldron Tuesday, May 20, 2008

    Don’t try lead wallets to keep those id cards from “transmitting” data. Buy a Faraday cage insert. Any device inside a Faraday cage won’t be able to transmit data. They have them for Passports also. It should be standard equipment in today’s wallets.

    Share
  9. You don’t need protection for ID cards after you microwave them for a second or more.

    Share
  10. Your phone regularly transmits an ID to the cell towers so the service provider can route calls to you to the correct cell. I have heard that governments can listen from your phone when they choose. That would not be difficult technically, but it would eat up battery life. The only way to be sure with a mobile phone is to remove the battery. Landline phones are much easier to use as bugs. The only way to be sure they are not active is to unplug them.

    I designed after theft vehicle recovery systems. The boxes kept a record of your journeys. The bosses insisted on GSM to communicate with the boxes, so the cost of getting data back to a control centre was prohibitive unless someone else was going to pay for it. The lawyers said that vehicles could only be disabled if the engine was not running. They did not want to deal with cars smashed on a level crossing.

    The popular way to get passwords from your computer is to used a key logger – a program that records every button you press on the keyboard and send it back to whoever controls your computer. You can reduce the effectiveness of a key logger
    by cutting and pasting your password instead of typing it.

    Share

Comments have been disabled for this post