Technology has become a part of almost everyone’s life. It wouldn’t be difficult without computers, cell phones, GPS devices, and gaming systems for many of us. Public video cameras are proliferating and evolving. Smart phones have taken regular cell phones to a new level.
This article will examine how these devices penetrate our privacy. Technology is used for much more than just helping and protecting us.
Infrared Cameras
It is wrong to sneak walk into a house and search someone without a warrant. It allowed them to use a device that can see through walls and spy on someone outside the house.
The only thing different is the watcher’s body in the house. This should be as illegal as a bathroom camera. What is more concerning is that there is no way to tell if the rabbit is looking through the walls of the bathroom.
GPS Tracking Devices
It is wrong for a citizen to put a GPS tracking device in someone’s vehicle and track their location. It is perfectly permissible, legally, for a government agent to place a GPS device in any vehicle, even if it is parked in a person’s driveway. The device may not be detected and removed by the owner of the vehicle. He can show his control and get paid for his art.
Behavior Review Security Camera
Security cameras are being retrofitted to include a firmware chip that can recognize human behavior patterns. The information is fed to a computer that can notify security personnel of suspicious activity.
Xbox Kinect
Called Xbox Project Natal, Microsoft has leaked information that it will use Kinect built in spy cameras. are carried out The information is intended to be used for marketing purposes and to be used by third parties.
Facebook Accounts
There are many indications that social networking sites such as Facebook are being used for data harvesting. The information is now stored on file and it is unknown who ultimately has access to the information. Try deleting your Facebook account. It cannot be done. Facebook only allows one to deactivate it, however the system exists.
Google Earth
Really scary photos of almost all homes and businesses are readily available through Google Earth. Easy access makes it easy for criminals to determine the best way to access a property before committing a crime. Google provides a way to block access to proprietary images.
Smartphones
There are several apps available that allow the user to turn their smartphone into a camera, microphone, and GPS function of another person’s smartphone without them knowing. One malware product is called a rootkit.
Search Engines
It is well known that research data is collected and stored through cookies. Turning cookies off doesn’t always stop because another program could generate its own cookies.
Body Scanners
It is hard to believe that this will be allowed by one government. The TSA also searches pilots who are already authorized to carry guns. all madness Recent many news stories have reported on this matter.
Microsoft Operating System
Microsoft Operating system has little security. If it was done then, it would be difficult for the OS to be infected with malware and spyware. Microsoft is finding and fixing these security holes all the time with no end in sight. Linux OS is the only viable solution that has real security.
Conclusion
It is impossible to know everything that is going on in today’s high-tech world. We are all being watched. The best defense is to limit access to personal information and feel it is always being used against you in some way.
Sources:
Customer experience in computer security
Clay Dillow, “Sold Kinect Camera Data for Ad Targeting.” popsci.com
Chris Morran, “Personal Information for 100 MillionFacebook Users Harvested into One File.” consumerist.com
Eric Bland, “Malicious Software Turns Your Cell Phone Against You.” news.discovery.com
Elinor Mills, “Microsoft Fixes Record 49 Holes, Including Stuxnet Flaw.” news.cnet.com