Skip to content

Unexplainable.net

Watching The World Change

  • Mind frequencies, communicate with your alter ego Simply Unexplainable
  • Helium 3 May Answer Energy Crisis Technology Articles
  • Buddha Pilgrimage Locations in India and Nepal Religion Articles
  • The Burning Times & More Wicca Terms Religion Articles
  • What are the Mogao Caves? Ancient Civilizations
  • UFO Sighting Brings Back Memories UFOs and Aliens
  • A Teller Of Tales Self Improvement
  • Telekinesis in General Simply Unexplainable

How the Free Flow of Data Threatens Our Privacy

Posted on June 1, 2013 By jim No Comments on How the Free Flow of Data Threatens Our Privacy

In January 2013, Popular Mechanics brought up a good point ”“ ”˜Who’s Spying on Us?’ We live in a society where the power and influence of the digital world has a far-reaching hand that touches our lives in ways we don’t expect. From the smartphones we program to emails traveling across the Internet, our personal information is constantly being collected (and is oftentimes stored in unknown locations). With the looming threat of hackers and increased government surveillance, the escalating free flow of data poses a detrimental threat to our privacy.

Who would have thought that we’d live in a day and age where playing a simple video game could lead to being entangled with the authorities ”“ all at the hands of a hacker. People can actually hack into the profile of an Xbox Live player, which contains billing address details, and use this information to do as they please.

There have been a handful of incidents where 911 call centers have become involved with people fabricating emergencies in a prank-style fashion ”“ a practice dubbed ”˜swatting.’ In the end, such pranks cost taxpayers thousands of dollars as the local police (and sometimes SWAT) have been pulled into the false reports. The pranks have not only involved the average citizen, but have also been used to terrorize celebrities and launch image attacks against politicians.

Unfortunately, Xbox Live is not the only service that places people in a vulnerable position, and there are plenty of other ways that hackers and other intrusions can find a way into your life.

Going beyond avoiding spyware on personal computers or having a weak Internet password, below are just a few things to become aware of if you’re looking to better protect your privacy:

  • Smartphone Applications: Smartphone apps consistently track the activity and location of users. The phones of today have GPS capabilities, connect to the Internet, and have the ability to run software ”“ all of which can contribute to locating the whereabouts of the phone’s user.
  • Facebook: With ever-changing policies, you never know who is scanning the millions of status updates and photos that appear on Facebook. Stalkers have a field day with the ability to keep tabs on their victims. We already know that higher learning institutions will check the Facebook profile of school applicants, and places of employment have fired workers for questionable behavior posted on a profile. Insurance companies have dismissed disability claims after seeing Mr. Smith partying in Cancun when he’s supposedly suffering from back pain. The police have also successfully used Facebook to make arrests.
  • Twitter: Many people have found out the hard way that a Tweet can lead to theft and robbery ”“ criminals have used both Twitter and Facebook to help plan a robbery when they learn that potential victims are on vacation.
  • Surveillance Cameras: There are surveillance cameras that can perform instant background checks on people by using facial recognition systems ”“ connecting ”˜suspects’ with mug shots stored in criminal databases. Some cameras can even read and monitor license plate activity.
  • Law Enforcement: Advancements in technology coupled with increasing changes in the law (regarding surveillance powers) have given police on the local, state and federal level the right to access records without the consent of an individual. The feds can also snoop into your previous purchases using what is called a ”˜warrentless hotwatch request.’
  • Credit Card Companies: If you’re wondering how or why certain marketers target you ”“ consider the fact that banks and credit card companies have a habit of selling your personal shopping data.
  • Online Stores: Online shopping can be quite convenient, but not when retailers use cookies, pixel tags, and the Internet to track your activities and then aggressively pursue you with targeted ads that just so ”˜happen’ to pop up while you’re browsing other sites.
  • Cell Phone Towers: Every time a mobile phone accesses a tower, a time-coded trail of the user’s movement is created ”“ something that law enforcement can get a hold of. It doesn’t even matter if you made a call or not for the tracking to take place.

There are many other ways that we are tracked ”“ proving that Big Brother is not the only thing ”˜watching’ us.

Information and Theories

Post navigation

Previous Post: The Latest in Mind Control ”“ Using the Brain to Create 3D Objects
Next Post: What Not to Get Your Kid for their Next Birthday: The New Xbox One

Related Posts

  • Tallest Buddha in the World Information and Theories
  • Vatican offers exorcism lessons Information and Theories
  • 2010 Archeology News Recap: July Information and Theories
  • An Introduction to Palmistry Information and Theories
  • What is a Curse Tablet? Information and Theories
  • The Serpent Sword Information and Theories

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The Meat Eater couple arrested for child abuse
  • The Meat-Eater boxer kidnapped and raped a young school Girl
  • Carnist man arrested for 198 years for raping and shooting a woman
  • Mitch McConnell- Eating Cow Corpses
  • Animal Flesh Eater Arrested: Felony Charges Serious Injury To 3 Month Old!

Recent Comments

No comments to show.

Archives

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • May 2020
  • June 2018
  • February 2018
  • July 2016
  • May 2016
  • February 2016
  • September 2015
  • July 2015
  • May 2015
  • April 2015
  • March 2015
  • January 2015
  • December 2014
  • November 2014
  • July 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003

Categories

  • Ancient Civilizations
  • Benjamin Fulford Story
  • Corrupt Carnivores
  • Cryptology and Monsters
  • Eating Healthy
  • Ghost And Demons
  • Information and Theories
  • Mars Coverage
  • Meditation And Spirituality
  • Mysteries
  • NASA Articles
  • Other Exciting News
  • Personal Accounts
  • Pictures And Multimedia
  • Political Conspiracies
  • Recent Submissions
  • Religion Articles
  • Self Improvement
  • Simply Unexplainable
  • Space and Astrology
  • Technology Articles
  • True Stories
  • UFOs and Aliens
  • Unexplainable Video Library
  • Unexplainable Weather
  • The Future of Yesterday – Clothes of Glass? Technology Articles
  • Fifteen Cold Minutes Change Alaska UFO Witness’ Life UFOs and Aliens
  • Treatise On The Rules of Metaphysics Simply Unexplainable
  • Interstellar Propulsion and interstellar planetary travel Simply Unexplainable
  • Ancient Cities: Palenque, Mexico Ancient Civilizations
  • Avril Lavigne Uses Illuminati Symbolism in “Rock n Roll” Music Video Recent Submissions
  • Caduceus Coil Used To Time Travel Simply Unexplainable
  • The Tarot Simply Unexplainable

Copyright © 2023 Unexplainable.net.

Powered by PressBook News Dark theme