Counter- Surveillance as a form of Protection.

Digital Diary:

Sunday, November 29th

Before this experiment all of my social media was available to the public, on this day I decided to privatize all of my social media, even turning on the “ghost mode” feature on Snapchat so no one could track where I was. The results I got from this were interesting as I assumed no one would notice that my social media was now private. However, I had a few friends message me and ask why, I also got a decent amount of follow requests, which was surprising considering these people had not followed me before. I also noticed that my tweet interactions on Twitter had gone down, meaning that more individuals that don’t follow me view my content rather than the other way around.

Monday, November 30th

On Monday I decided to use the search engine “DuckDuckGo” which allows individuals to “search the web without being tracked”. With the ongoing discussion of politics, I put into the DuckDuckGo search engine and Google “Donald Trump is…” to try and see if the results were different considering Google curates responses to fit the user’s appeal. What I found was that DuckDuckGo not only gave more accurate responses but more information filling in the blank. With Google, there were the questions of Tiktok and Roblox being banned, both applications that I use. It was surprising to see that Google had retained that information and to find out that “At DuckDuckGo, we do not collect or share any personal information. That’s our privacy policy in a nutshell. For example, we do not store IP addresses in our server logs, and we do not create unique cookies. As such, we do not even have the ability to create search histories or search sessions for any individual — privacy by design.”

Friday, December 4th

On this day I decided to stop allowing all applications on my phone to access my location. As a result of this, I was not given advertisements for restaurants and stores near me. An example of this is when I started getting advertisements on my Instagram feed for the restaurant “Beech” in Charleston after eating there a few times throughout the semester. After turning off my location I got ads for places in states like North Carolina and Colorado. While I do enjoy getting advertisements for places close to me, it was unsettling first seeing the Beech advertisement on my Instagram. Turning off my location on all apps made me realize how many different services track my location. The Drive Safe & Save State Farm application tracks all of my driving throughout the day, and although State Farm says they do not sell customer information that is not always the case with companies.

Saturday, December 5th

This day I chose to do one of the examples Applymagicsauce.com to track my digital presence on Twitter. What the sight told me was fairly surprising but also showed me how much information I present on social media, allowing this site to create a “personality test” off of my tweets. It was slightly unnerving considering I joke all of the time on Twitter about people’s perceptions of me, but I still give out information to Twitter about who I am as a person. I think this website was the most interesting, but I wish that there were other social media accounts you could link considering I don’t have Facebook. Ultimately this website will make me second guess what information I am willing to put out on social media.

Sunday, December 6th– On the last day I decided to not use websites that use cookies. It was interesting to search for “websites that use cookies” and while I didn’t find a clear list of sites that don’t use cookies, I realized that a majority of websites that were a result of my search used cookies. Even when online shopping places such as H&M use online cookies to “Make our website work efficiently and secure and to improve perosnalised user experience.” When I read about the types of cookies and how H&M and other third parties can access them, it made me second guess all the online shopping I have done. Although individuals are able to disable these cookies, I feel as if it’s already too late to erase any type of digital footprint. Of course, with older individuals or children who don’t have access to technology, this is not a problem, but I have already put so much information online as someone who grew up with technology.

During this new digital age, it is difficult to understand how and why social media apps and websites are gaining access to valuable information. While it is in part a problem with users, with the usage of location tracking or online cookies companies are gaining access to hoards of personal information. Now individuals have learned to combat this privacy issue is by counter-surveillance, which can be defined as measures that are usually taken by citizens to prevent surveillance, including covert surveillance. Although this surveillance may seem like just a price to pay for a curated online experience, it is alarming to see how much information companies collect. During this counter-surveillance as a form of protest experiment, I used applications and setting such as location tracking, DuckDuckGo, Applymagicsauce.com, and disabling cookies.
I find it ironic that I am the type of individual to talk about my hatred of being perceived but allow so much information to be publicly accessible on social media. Using the Applyingmagicsauce website allowed me to see how individuals would view my personality based on my tweets. Even though this website only found information like what my gender and personality was like, it was still surprising how much information they could collect from 112 tweets. This website said that my digital footprint closely resembles that of a 25-29-year-old and guessed my age as twenty-eight and while this information is false; it was interesting to see that the application thought I was that old. This website also determined whether you were male or female, my percentage came out to 59% saying that while my “digital footprint is fairly androgynous; it suggests you are probably female”. This website was definitely the most entertaining, it also made me aware of how I present myself on social media and my personality type.
One of the more uncomfortable experiences I had during this project was when I was scrolling through Instagram and saw an advertisement for “Beech” a restaurant on King Street that I had gone to a handful of times over the semester. While I was alarmed at the fact that Instagram clearly knew my location and the places I had visited, I shouldn’t have been surprised. I never go anywhere without my phone since it is my only source of instant communication. This advertisement made me realize that my location services were turned on for almost every app I had on my phone. I never really used the Snapchat “Maps” feature, but when I decided to enable “Ghost Mode” in which no user could see my current location, I had a few friends ask why I had done so. My friends already know where I live and frequently visit, but it made me paranoid when I realized that people actually would check my location. With apps such as State Farms Drive Safe & Save, I was unable to turn off my location because of my Dad’s love of savings. However, I feel safer knowing my location is only available to one application while I am driving. Even with the State Farm app, I do not allow them to always track my location, whether or not that is truly the case I do not know, but it does make me feel as if I’m taking back my digital identity.
Then there were online cookies, which sound harmless when brought up on a pop-up while you are online shopping at stores such as American Eagle or H&M. These online cookies can do things such as track users browsing histories and also allow third parties to access this information collected. As someone who has had a cellphone since the age of twelve and had a laptop at fifteen it is hard to imagine how much of an online presence, I have created for myself. Up until this past year I was virtually unaware and carefree about the information that my social media apps and online browsers had obtained. While this may not be the same for older generations who did not grow up in this digital age, I feel as if it’s hard for individuals who have already given so much information to these companies. Still, there can be things to prevent companies from accessing this information such as not accepting the usage of cookies and using a private browser such as DuckDuckGo.
Ultimately there should be five rules for equity and fairness when it comes to data sharing. Those rules include not selling information to third parties, making users explicitly aware of the information an application tracks, allowing users to opt-out of any data sharing and tracking, making this information hard to access in the event of a security breach, and stopping the usage of curated searches by region. By implementing these rules companies can still access the information of willing participants while keeping their users privacy.

Final Counter-Surveillance as a Form of Protection Seth Cullen

Dec 1.  Day one of becoming “digitally woke” I decided to start by switching from Google to Duckduckgo.  Duckduckgo is a search engine with all the features google has, such as images, videos, news, and maps.  The fundamental difference of Duckduckgo is that it does not collect and sell your search data.  I would like to add another benefit is that because your search data is not stored each time you search you receive an unbiased result.

 

Dec 2.  I was happy with the new feel of Duckduckgo, so I decided to switch to another browser. Tor was the first and obvious choice.  The makers of Tor have a mission of ending the “digital fingerprint” which is a unique series of information on your computer hardware.  Tor is not as pretty or smooth as Firefox or Google Chrome, but I think the mission it stands for is worth the switch.

 

Dec 3.  For day three I must go back in time.  A little over a year ago I set a Pihole in my house. Pihole is an ad blocker that works on all devices on your internet.  It is highly configurable with an administrator portal.  The setup is not easy for people with little programing experience.  You must buy a Raspberry Pi and configure the software to work as a Pi-hole.  My family and I really enjoy having no ads, and it also increases the speed in which websites load.

 

Dec 4.  Day four is still in the past shortly after making the Pi-hole I decided the next step was to setup a household VPN using Open VPN.  The setup for the VPN is similar to the Pi-hole and I was able to put it on the same Raspberry Pi. The benefits of having the VPN hosted from my house are that I can access devices on my network from anywhere. The VPN also ads an extra layer of security when accessing my network. Having a VPN also stops your internet service provider for tracking you.

 

Dec 5. Today I bought five dollars’ worth of bitcoin or 0.00026000 of one coin.  Bitcoin is a useful way to take back your privacy from being tracked for purchases online and even at some stores and restaurants.  Bitcoin is encrypted end to end on transactions.  There are no receipts to track your uses of bitcoin.

 

Dec 6.  I wanted to use a new email service that was encrypted.  I did some research and decided to try Protonmail hosted in Switzerland.  The service has a mobile app that syncs with the desktop and is user friendly.  A great feature of using the service is that Swiss privacy laws cover it.  The biggest downside of using the service is that if you lose your password your account is gone if you do not have a recovery email set.  The service is similar to any other email, but the user interface is nothing exciting.

 

Dec 7.  Today I decided to do a check on what comes up on me online using OneRep.  The service informed me of 17 different websites where my information was available, including where I was from and my phone number. I investigated one of the websites that had my information, it was called social catfish. The website claims to be able to reveal info on people such as usernames, arrest records, previous relationships, and other sensitive information.  But once the scan of myself was done it had me under a different last name, and I did not want to pay to see someone else’s information.  OneRep claims to remove the information from the websites it finds, but it charges a fee, so I am unsure if it is worth paying for.

 

 

 

 

 

 

Counter-surveillance is a form of protecting oneself from being surveilled.  The ways in which I used counter-surveillance to take back my online privacy were Duckduckgo, Tor, Pi-hole, Open VPN, Bitcoin, Protonmail, and OneRep.  I used Duckduckgo to stop having my search data collected, used, and sold by Google. I used Tor to erase my digital fingerprint.  I made a Pi-hole in order to remove ads while using internet browsers on all devices in my home.  I set up Open VPN to stop my internet service provider from tracking me online.  I bought Bitcoin to purchase stuff online without a trace.  I created a Protonmail account to send encrypted emails. I scanned myself with OneRep to see what information of mine was available online.

My goal in using the aforementioned counter-surveillance techniques was to take a step in gaining back my online privacy.  I would also like to spread awareness of what steps you can take to protect our data online.  Additionally, I would like to inform readers about the ways that websites, apps, and other services collect, store, and track our data.  I believe that we need to take a stand and draw the line on what information is taken, and who can take and see it.

The self-knowledge I gained from taking back my online privacy were: how much data is collected, who collects the data, and how my data is used.  After learning of how my data was being taken advantage of I realized that I am not okay with it anymore.  I learned of new ways to take back my privacy online.  Taking the steps that I did make me feel much more secure in my online activities.

Data becomes valuable information to me when it can be used against me in any way, such as spam callers contacting me, or my phone location being used to track me. It is under uses like those that it can be manipulated to cause impacts on society.  Data is also valuable in predicting the behavior of different groups of people.  This can have negative side effects, especially when used in terms of race, gender, or country of origin.

If I were to have my own terms of service, they would allow for less data collection.  I would allow for data to be collected that is anonymous, meaning that the data could be collected but not linked back to me.  The data would be for purposes of improving services related to the data, such as improving algorithms.  I also would like for the data to not be stored for more than thirty days.  I also am not okay with information on my computer’s hardware being collected such as monitor sizer, or what video card is installed.  Additionally, I would like the data to be encrypted end to end when being collected so it is not subject to an outsider attack while data is transferring.  I am okay with my data being collected so long as it meets these terms and has a benefit for the website or service that is useful to the community and myself.  These are my five rules for equity and fairness when it comes to data sharing.

I have become a big fan of Duckduckgo, I installed their additional browser extension for Firefox.  Overall, I think the community that uses Duckduckgo is fed up with Google and other companies that collect and use their data. Duckduckgo is unbiased, and in my opinion that provides greater search results.

I will not use Tor as my daily browser just because it lacks some features of Firefox that I have grown used to. I like the goal of Tor to reduce and eliminate digital fingerprints.  I also like how it is open source and transmits your privacy thought the community.  The idea of Tor is very appealing to have an anonymous internet, but it is honestly unpractical for daily use.

I cannot express in words how happy I have been with my Pi-hole. The community is regularly active on Reddit and you can get responses to any questions within hours.  I have been working on computers for years.  I had done some work on Raspberry Pis before, but this was by far the most user-friendly installation I had ever done.  I did what is referred to as a headless installation, meaning I did not connect the pi to a monitor, instead I remoted into it from my computer.  The whole process took under thirty minutes, I have had to do little updating to the list of sources to block from and there are lists you can copy online.

Open VPN was extremely useful until I moved, and my configuration no longer worked. I liked being able to remote into my network and use my devices from anywhere. I connected to it if wanted to connect to unsecure Wi-Fi and not have them see my data.

My bitcoin will fluctuate in value and likely increase after a while. I look forward to spending my bitcoin in the future anonymously. I think the way how algorithms make the transactions happen is incredibly unique and interesting.

Protonmail is a service that I believe could be developed to become a main source of email.  The Swiss take their online privacy seriously, and since Protonmail is hosted in Switzerland you benefit from their privacy laws.

OneRep is a website that looks online based on your name and location to what pops up online about you and what websites that information is available.  I was not happy with the idea of paying them to remove data that I could not see, and I would not recommend using their services.

My findings from the group reflection are that we used similar strategies of taking back our online privacy. Michael, Harrison, and I all used Duckduckgo which is a great tool for taking back online privacy.

The Privacy Paradox & Me

The podcast “The Privacy Paradox – note to self” (WNYC Studios) consists of 5 newsletters (podcast episodes), which include “tips and a short podcast explaining the science, psychology, and tech behind that day’s challenge.” (The Privacy Paradox, https://project.wnyc.org/privacy-paradox/) Now that you have listened to the first three episodes, it is time for us to reflect upon each day’s challenge.

Please use this blog entry to write about one episode of the first three episodes of the Privacy Paradox that particularly spoke to you. Which episode and their challenge provided the most interesting learning experience for you? For example, the first episode, “What your Phone knows” introduces you to different ways how to trim down our metadata collected by your phone. You could reflect in your blog entry how the first challenge made you think about what your phone actually knows? Did you further engage with recommended apps of the challenge or changed your privacy settings? If yes, what did you do?  Do you think it is an effective step to take back your digital identity?

You might be already familiar with some of the Privacy Paradox Podcast suggestions or have discussed issues addresses in the Podcast over the course of the semester. Feel free to draw connections to other works that we have already discussed.

Juli Zeh “The Method” & Health Apps

Discipline, control, and health of the body are the three pillars of THE METHOD, which declares health as the principle of state legitimacy. Juli Zeh’s dystopian narrative of THE METHOD examines the notion of a society that is established on the optimization of the individual as a result of the harmony between the body and mind. By monitoring the well-being of its citizens through an implanted chip in the upper arm, THE METHOD makes human actions and information readable, collectible, and sharable to governmental control and the greater public. As a rewrite (palimpsest) of George Orwell’s 1984, Juli Zeh’s work engages with the question of what it means to be human in a world in which “a person’s data trail can be taken apart and reassembled in a million of different ways” (Zeh, The Method, 199). In 2020 our own health data has become a particular value while living during a pandemic.

Please use this blog entry to reflect upon potential benefits, repercussions, and ethical challenges of contact tracing, health related data sharing, collecting, and mining. Write at least 250 words, answer the questions posed in no. 1, and pick at least one more question 2. or 3.  Comment on another students’ blog response. When applicable (answering number 2, include a quote from Zeh’s The Method)

1.  Pick an app that collects health data such as sleep patterns, activity levels, Covid-19 symptom tracking, or contact tracing (examples might be: SleepCycle, Headspace, CofC’s Student Health Service Apps, MyFitnessPal …).  There is no need to download a specific app, it is up to you which one you want to use. You could also reflect upon an integrated health-related app/functions of your smartphone, Apple Watch, or FitBit.  Think about the following questions when you engage with the app: Which data is collected? Who has access to that data? What is the individual, but also the collective benefits of collecting such data? Who is benefitting from sharing such data? Are there ethical challenges or repercussions attached to using your app?

2. Compare your findings from question 1 with the depiction of THE METHOD’s health care surveillance systems. Can you spot any similarities? What are the differences?

3. The concept of “Data doubles” (Haggerty, and Ericson The Surveillant Assemblage challenges the idea of individuality. In which ways does our understanding of what it means to be human change when one becomes a bundle of “health” related information that is readable, collectible, and shareable with other entities?

Christa Wolf & The GDR

Dear Students,

With Lives of Others we got a first impression about everyday life in East and West Germany in the 1980s. Christa Wolf’s What Remains gives us a more detailed picture of the experience of living under Stasi Surveillance. The well-established former East German writer and literary critique Wolf wrote What Remains in 1979, but published it after the German reunification in 1990. Wolf, who briefly worked as an informant “Inoffizieller Mitarbeiter” for the Stasi was watched closely for almost 30 years.

Please use this Blog Entry to start a conversation with your classmates. Write 250 words and include at least two quotes from the text/film to backup your argument. Respond to your classmates’ comments and grapple with two of the following questions in your Blog Entry:

1. How is life under the Stasi portrayed in Wolf’s What Remains and The Lives of Others? Please compare the short story with the film.
2. Wolf gives us an insight into the experience of watching and being watched in the GDR. How does this oscillation between the two modes of observation impact individual behavior, thinking process, and overall life condition?
3. Which dimensions of privacy are infringed by the Stasi. How? What is the purpose of it?
4. In which ways does What Remains offer us a reflection upon the ways to break through the imposed control by the Stasi and to develop individual agency?

 

Hasan M. Elahi “Tracking Transience”

On Thursday we will discuss Hasan M. Elahi’s digital art project “Tracking Transience” in tandem with Simone Browne’s work “Dark Matters: On the Surveillance of Blackness.” This blog post will be a little bit more open-ended.

How does the excerpt of Browne’s Dark Matters inform your interpretation of Hasan M. Elahi’s “Tracking Transience” project? For whom can it be beneficial to not be tracked and in which contexts? What is the role of gender, race, or class when it comes to aspects of tracking and surveillance? In which contexts can tracking be beneficial and for whom?

Make sure you’re your blog is about 250 words long. Your blogpost needs to comment, respond, or critically engage with your classmates’ blog entries and use examples of your own watch-experience of Hito Steyerl’s digital art. Incl. at least one quote from Simone Browne’s Dark Matters to back up your arguments.

Consider this blog to be our conversation starter. We will continue the discussion in class on Thursday!

 

Hito Steyerl “How not to be Seen”

On Thursday we will discuss Hito Steyerl’s digital art project “How not to be Seen” in tandem with Simone Browne’s work “Dark Matters: On the Surveillance of Blackness.” This blog post will be a little bit more open-ended.

How does the excerpt of Browne’s Dark Matters inform your interpretation of Hito Steyer’s video “How not to be Seen”? For whom can it be beneficial to not be seen and in which contexts? What is the role of gender, race, or class when it comes to aspects of visibility and surveillance? In which contexts can visibility be beneficial and for whom?

Make sure you’re your blog is about 250 words long. Your blogpost needs to comment, respond, or critically engage with your classmates’ blog entries and use examples of your own watch-experience of Hito Steyerl’s digital art. Incl. at least one quote from Simone Browne’s Dark Matters to back up your arguments.

Consider this blog to be our conversation starter. We will continue the discussion in class on Thursday!