Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Mary Jane has no computer; hence no email.  She has credit cards, store savings cards, library card, a transit card and a cell phone.

Similar presentations


Presentation on theme: " Mary Jane has no computer; hence no email.  She has credit cards, store savings cards, library card, a transit card and a cell phone."— Presentation transcript:

1

2

3

4  Mary Jane has no computer; hence no email.  She has credit cards, store savings cards, library card, a transit card and a cell phone

5  The grocery stores know what she purchases, when she purchases it. They have personal information when she applied for the store savings card.

6  Stores restock their shelves based on the UPC codes.  Coupons are developed to encourage sales  Direct mailings are sent to her.

7  When her cell phone is on, the phone company can track where she is through pings off cell towers

8

9  Cell companies collect data every time a mobile phone accesses a tower, whether or not a call is made. That leaves a time- coded trail of user movement accessible to law enforcement.

10  The gold standard of personal tracking devices smartphones have embedded GPS, are internet-connected, and can run software. They allow location and behavior to be tracked through your cellular provider, by the device manufacturer, and by the developers of the apps you install.

11  She is caught on film nearly 200 times daily  There are 30 million CCTV cameras in America  About 200 Million US citizens have had their call records monitored since 9/11

12  Since 9/11 NSA has been collecting detailed call history and conversations from the nations three largest phone companies to build the largest data base in the world

13  The IRS had 1.8 million cases of tax refund fraud in 2012. This includes direct deposits as well as hard checks

14  Banks and credit card companies routinely sell your shopping data to marketers. Even the feds can sniff your purchases in real time via a warrantless “hot watch” request

15  Customer data is big business—for target advertising, sales leads, and behavioral analysis. Some firms collect data directly from customers; others use data aggregators which amass bigger, richer databases from multiple sources. That information is sometimes hacked due to substandard security, and much of it is subject to subpoena by law enforcement.

16  Scan you face to tell your gender and age.  Then the content of the bill board changes content to respond to the person viewing it.  Promotion video by Intel showing how it works

17

18  Load antivirus software onto your smartphone and keep updated.  Apple has free one at iTunes AVG Safe Browser.

19  Download apps only from usually reliable sources such as Google Play or App store for Android on Amazon.com

20

21  Set a pass code on your smartphone.  Consider tracking software for lost or stolen phone

22

23  Mary Sue has a computer and uses the internet and has an email count.  She is tracked by computer cookies

24  Cookies are the nexus for most online snooping. PCs can be watched to monitor your browsing habits or taken over outright by spyware, enabling remote access to all of your personal files and control of the device itself.

25  Retailers such as Amazon and Apples iTunes have made customer profiling part of their business strategy. Many stores use cookies, pixel tags, and Web beacons to track you to other sites as well—so the product you browsed at one site shows up as an ad at another site.

26

27  Through tracking devices, the browsers records your movement to sites and individuals and corporations receive those movements

28

29  Searches and online email accounts provide rich sources of data for advertisers; weak password protection can also make personal online accounts prime targets for hackers

30

31  Aquarius  Aquarius1  Aquar$ius1  Aqu57ar$iu3s  9.08 minutes  1.59 days  19.24 years  17,400,000 years

32  Data breaches persist despite security push in government agencies, companies, medical records, restaurants, stores, bank pin numbers, etc.

33  Every move we make is subject to digital prying eyes, and once your data has been collected, there is no telling where it will end up

34

35  Toy Drone locks on a face in the distance, then identifies it.  Can take a masked face and focus only on eyebrows and search a catalog and identify

36  Utzav is a system that take your photo and the software maps a face using dots like electronic measles and creates something as unique as a finger print: a face print. Pins and passwords are giving way to face prints. Face recognition can be done without your knowledge.

37

38  In the past 12 years law enforcement agencies have been granted vast surveillance powers through changes in both the law and the technology available to them. Local, state and federal authorities routinely access records about customers from private industry as well.

39  Both the quantity and capability of surveillance cameras have increased dramatically in the past decade. Modern license plate readers can process 1800 plates per minute, and facial recognition systems such as the one used by the Pennsylvania Justice Network can automatically match faces from surveillance footage to mug shots in criminal databases.

40  Cameras monitor the outside of cars but many cars have internet-connected telematics systems on the inside that log location and driver behavior. Insurers now offer safe-driver discounts for drivers who enable tracking devices on their vehicles.

41  Access to Global Positioning System satellites is now routinely built into cars, smart phones and tablet computers, making it possible to locate any of these devices to within 25 feet.

42  All public Wi-Fi should be treated with caution  Update your laptop, tablet or smartphone security software immediately before staying at a hotel

43  Never use hotel WI- FI for on line banking, credit card account management or investment management  Do not use hotel lobby computers for these things eithers

44  Check with hotel to confirm you are logging into the authentic hotel WI- FI. “Key loggers” are often loaded onto public computers


Download ppt " Mary Jane has no computer; hence no email.  She has credit cards, store savings cards, library card, a transit card and a cell phone."

Similar presentations


Ads by Google