Information Insecurity: Privacy under Siege - page 13

Lower Manhattan Security Initiative,
45
Mazujian, Stephen, 32
medical data, 12; privacy and, 15, 24
mug shot websites, 38
National Security Agency: and fight
against terrorism, 50–59, 79; phone
data collection by, 50–59; spying on
US citizens, 7, 13, 79
Nest appliances, 72–73
Next Generation Identification, 46
1984
(Orwell), 58
Obama, Barack, 56–57
photos, 4–5, 34–35, 36, 38–39, 67, 68,
76; surveillance, 45–48; taken via
remote computer access, 43
Planet Labs, 69
Poitras, Laura, 50–52, 56
Pole, Andrew, 23, 25–27
police, 5, 7, 8–9, 13, 32, 33, 37–38, 61,
64; cell phone tracking by, 48–49;
and search warrants, 62; use of
facial recognition software, 45,
46–47
PRISM program, 55
privacy, 17, 19, 26, 35, 42, 44, 46, 48,
53, 54–57, 60, 62–63, 64, 67–71,
76–79; definition of, 4–7; digital
tools used to protect, 63; US and
European laws regarding, 8–11, 24;
website policies regarding, 34–36,
38–41
profiles, digital, 15, 17, 19, 20–21,
25–26, 28, 30, 51
remote accessing of phones and
computers, 42–43, 49–50, 52
right to be forgotten, 65–67
Riley, Connor, 37
Robbins, Blake, 42, 44
Roberts, John, 64
Rousseff, Dilma, 54
satellite photos, 67–71
Schrems, Max, 40
scientific marketing, 22
screenshots, taken via remote
computer access, 43–44
search engines, 6, 66
search results, 32–35, 38, 65, 67
search warrants, 49–50
security cameras, 45–47
self-censorship and the Internet, 10
sensors in machines, 73–74, 77
September 11, 2001, terrorist attacks,
48, 50–51, 59
sexting, 33, 35
smartphones, 72–74, 78; location
tracking of, 13, 15–16; privacy
tools for, 63; searching of by law
enforcement, 62
Snapchat, hack of, 35–36
Snowden, Edward, 51–53, 55–57
Soviet Union, government surveillance
in, 9, 51
splinternets, 54
Stellar Wind program, 50–51
Street View: privacy policies of, 67–71;
unauthorized data collection by,
67–71
Target Corporation: and customer
data collection, 23–27; pregnancy
prediction program, 23–27
telephone companies and user data,
17, 52–53
terms-of-service (or terms-of-use)
agreements, 6–7, 16
terrorism, fight against, 53, 55
Thefacebook.com, 21–22.
See
Facebook
third-party doctrine, 62–63
third-party web trackers, 14
tracking, 4, 10, 17, 20, 22, 43, 49,
62, 77; agencies and businesses
involved in, 7; tools used in, 13, 14–17
USA Freedom Act, 59
video surveillance, 45, 48
wearable tech, 75
weblining, 28–29
Web We Want, 60
95
1...,3,4,5,6,7,8,9,10,11,12 14,15,16
Powered by FlippingBook