Privacy on the Internet

Day 1: Using applymagicsauce.com

I decided to start the week off with something simple yet still informative. Before doing this project, I had never heard of the website, so it was pretty intriguing visiting for the first time. I linked my twitter and immediately got results back telling me a lot of information about myself, even though not all of it was correct. My age was off by about 5 years which I don’t hold much to because it is quite hard to tell the difference between someone in their early twenties versus late twenties. It was interesting to see my psychological gender was male as opposed to myself being female. It made me think what it analyzes to get that type of information. When I started to read the personality test it did for me, I was quite surprised how the application was able to tell all of those things just by the way I tweet, and many of them were right. Out of all of the results, I was most taken aback by the Meyers-Briggs test it does to your profile because out of all of the possibilities it guessed mine completely correct. Overall, this website really puts into perspective how much information someone can gather about you from just one social media profile online. It showed me how incredibly easy it is to create an online data double.

 

Day 2: Using Ad blockers

After listening to “Day 2: The Search For Your Identity” from The Privacy Paradox podcast, I went to Panopticlick.com and saw exactly what my browser was and wasn’t blocking. I was surprised that my browser was only blocking ads from tracking me and everything else was open and free. So, then I went and downloaded the Privacy Badger extension for google chrome. When I started using it, I was so surprised by how many ad trackers it had to completely block, and just how many there were constantly tracking me. It made me really think how long I had gone just letting these companies completely track me and how much information they have on me. Thankfully now, I don’t have to worry as much seeing that the adblocker is doing its job.

 

Day 3: Seeing and Changing My Privacy Settings

Being a frequent Apple user, I was aware of all the privacy setting you can change and have access to and a long time ago I limited these as much as I could. It was interesting to see how many apps wanted to use my location even if it seemed like they had no use for it. Some apps were even automatically set to always track your location which was also quite surprising. After looking at everything I still let some apps track my location but only the ones that are necessary and they can only track it while I’m using the app. The one new thing that I did find in my privacy settings were the option to see my “significant locations.” My phone had marked all the locations that I frequently visit and sure enough my parents’ house, my apartment, and even the building I visit most on campus was marked. I was also surprised to see it kept the location of my aunt’s house when I visited for a day during fall break. So much information is being gathered all the time and I’m not sure it’s beneficial to me in any way to keep this service on so I immediately turned it off after seeing it.

 

Day 4: Looking up Ad Settings on Social Media

Before the project, I wasn’t ever interested in checking exactly what my social media is tracking for ad purposes. When I went onto my Facebook, I was able to see the categories they sorted me into for ads. Thankfully, since I don’t use my Facebook all that often anymore, they didn’t have much information on me, as compared to other people. It was nice to see that for at least one day, my information was not as exposed as it could be.

 

Day 5: Going off the Grid

After listening to the Day 4 episode of the Privacy Paradox podcast, I tried out “Fifteen minutes of anonymity” except I tried to do it for an hour. Going into the challenge I was quite skeptical that I wouldn’t learn much since it was only an hour. I could not have been more wrong. As soon as I started the challenge, I was pretty bored. I really didn’t know what to do. I think that really says something to how much I rely on my phone for boredom. I decided to clean to at least have something to do. Even when I was cleaning, I kept getting distracted. My subconscious would keep going off with if I had gotten a text, an email, just something. It happened way more often than I thought it would. After about half an hour, the thoughts started to cease, and I was done cleaning. This meant that I had to find something else to do. I was going to do my homework, but all my textbooks were online, and so was most of my homework. I played with the cats for a little bit and then suddenly remembered this book I’ve been meaning to read for the longest time. I ended up going well over an hour while reading and while also not going to any technology. It was quite freeing to be able to survive without these things for so long. It really puts into perspective how much not only I rely on technology but also everything else, I mean who wouldn’t?

 

Day 6: Using an Encryption Tool

Much like the ad blocker I installed, the encryption add-on was interesting to use and look into. I downloaded Https Everywhere which is supposed to minimize the data on your computer that gets sent to various sources without being encrypted. This is quite useful and similar to blocking ads but instead of targeting ads, it targets everything, and instead of blocking it encrypts your data. As soon as I installed it and saw what services it was sending encrypted data to, I was reassured. Every website I went on was sending information to different companies, some I have heard of and some not. It was nice to see the list grow on websites and know that now I can have a little bit more peace of mind when browsing the internet.

 

Day 7: Taking the Exit Strategy Quiz and Reflection

I started the day off by taking the quiz located on Day 5 of the Privacy Paradox podcast. I was surprised to see I got a different result than the first time I took it. This time I was a “believer” which means I see privacy online for how it really is (or isn’t). I have lost a lot of trust in companies to keep the interests of the consumer first and keep information of data doubles open to such consumers. Most of the information I was able to access was not located somewhere accessible. I found myself trying to show other people the same information and forgetting exactly how I found it in the first place. Many times, I had to learn about myself through third parties or ad blockers and encrypters. This really just shows how companies are treating privacy and how the consumer usually doesn’t care enough to be concerned, which in my opinion will be a big problem for the future of technology.

 

 

Ashley Dowd

Koellner

LTGR 250

10 December 2018

Project Reflection

            Privacy is something on the internet that is highly valued to the consumer but often not talked about by companies. I created a project to look into my privacy on the internet and what exactly companies are gathering from me. First, I must define counter-surveillance. In my own words, counter surveillance is getting access and looking at all the information being collected from me on the internet. My experiment included researching and using various forms of counter-surveillance for a week. These forms included websites, apps, browser add-ons, software, and settings. All of this was to try and create the best representation of my “data double,” or “a digital duplicate of our lives captured in data and spread across assemblages of information systems” (Jones). In the end, I would have a good picture of what my data double looks like, what my privacy is like online, and what steps I should take to limit the information given out unwillingly. Information becomes valuable to me when it’s something I wouldn’t give out to anyone myself in person. Such things include, bank, personal, and healthcare information for example. By taking back my digital identity, I hope to get some control of the information I’m giving out on the internet, both knowingly and unknowingly.

First, I’ll start off with the actions I took online with browser add-ons. I used two different types of add-ons with one targeting blocking ads and the other encrypting my data. I found these the most useful because of how often I go on the internet and use the browser that I do. I started out by using Panopticlick.eff.org which told me exactly what my browser was and wasn’t blocking concerning information being given to advertisers. The name of the website is a direct link to the Panopticon imagined by Jeremy Bentham but later interpreted by Michel Foucault. It is basically a play on the power relationships in a society, and I believe the website is referring to the advertisers and companies being the figurative central power on the internet and looking at the consumers without their knowledge. After seeing just how many websites and other sources both add-ons had to block or send encrypted data to, it made me feel as if I was unknowingly being watched. This made me feel as if my privacy was being invaded and I was just now finding out. As for the add-ons themselves, I found them useful and appreciated them. Both of them were non-invasive and I barely notice they’re there which I appreciate. Overall, the browser add-ons did what they’re supposed to and gives me access to information in an easy way.

The next category of counter-surveillance I focused on was privacy settings. The most useful information I found out about myself was how often my location is being tracked. It seems that in my iPhone’s privacy settings, some apps would default to always track my location which someone would not know about unless they accessed their settings and manually changed it. I was surprised how that showed how much some apps devalue the user’s privacy. Secondly, I was surprised by how inaccessible some settings and information is. It almost seemed as if my phone or social media does not want the user to find information they gather, yet they make it available to be “transparent.” It took me a long time to see important information about myself, for example, what Facebook gathers from my profile and uses such data to categorize me and give to advertisers. I had to click on at least five different categories and sub-categories in my settings, and this was after being told how to access it, since before I had no clue such a thing existed. After listening to the Privacy Paradox podcast, it was clear that the user has to deal with all these problems and “try to turn this creepy situation into a merely crappy one” (Privacy Paradox ep.2). Generally, it seems that using the internet leaves the average consumer with no way to completely limit their privacy, which I think says something about the way the power is balanced in terms of the company and the consumer on the internet today.

In conclusion, privacy is something that still needs to be addressed in big terms on the internet. There exist ways to take control of what is getting out, but an internet user cannot limit everything. If a person uses the internet, they have a data double without question. In terms of how other people dealt with this problem of privacy online, many of partners also installed add-ons for their browser, considering it is most likely the thing used most to access the internet. Another area of focus was social media in which a lot of people accessed their privacy settings and also found out just how much information is used to create a “data double.” Many of the outcomes of these experiments were similar to mine because of how much information you can find out about yourself. Something that I found differed between myself and other people was the level of being concerned about your information. Some of my partners used heavier means of protecting privacy and some people did less than what I did which I can assume that their level of concern was lower. In conclusion, privacy on the internet is a give and take situation, the user gives as much as they think will benefit them in the end.

 

Works Cited

Jones, Kyle M. L. “What Is a Data Double?” Data Doubles, 17 June 2018,

datadoubles.org/2018/05/01/what-is-a-data-double/.

Poyant, Jen, et al. “Day 2: The Search For Your Identity.” Note to Self, WNYC Studios, 7 Feb.

2017, www.wnycstudios.org/story/privacy-paradox-day-2-challenge.

Counter-Surveillance as a Form of Protection: William Young

Day 1: Disabled my Facebook account and changed privacy and tracking settings in my phone. Facebook gathers and sells information on us to private corporations and organizations and most people don’t realize it.

Day 2: Began using Firefox and downloaded a number of addons, such as HTTPS Everywhere and various adblockers, in order to better protect my online presence.

Day 3: Looked up information about myself on applymagicsauce.com. Most of the information was wrong (I don’t use Twitter very much) but it was still interesting to see the information that can just be gathered and inferred from the public.

Day 4: Downloaded the Firefox app onto my phone. Firefox has famously been on the side of user privacy and net neutrality, so I figured it would be a decent investment that costs nothing.

Day 5: Changed all of my passwords. Not a huge deterrent but every bit helps. Changing passwords regularly can be a huge deterrent in information gathering.

Day 6: Began keeping an eye out for cameras around college campus. There are a number of them in the residence halls and a webcam looking out into the cistern in Randolph Hall.

Day 7: Changed privacy settings on my phone to better protect myself. Set location services to “off” on certain apps, but most of them I changed so that instead of always tracking my location, they can only know my location while I’m using it.

William D. Young

Professor Koellner

LTGR 250-01

10.12.2018

Surveillance Project Reflection Paper: Counter Surveillance as a Form of Protection.

In this age, more so than ever before in history, we must expect that we are being watched. It is simply the way life is now, information on ourselves is being gathered and sold to the highest bidder, and there is shockingly little we can do about it, but we are not entirely helpless. It takes a little extra effort, but by utilizing surveillance like our watchers do, we can protect ourselves from potential malicious threats. There are a variety of ways we can do this. Some are as simple as only using cash instead of debit or credit cards, others take more effort, such as watching out for cameras and downloading specific apps and web browsers. Regardless, it is more important than ever in this day and age to learn how to protect yourself online, and it is something that everyone should learn how to do.

Surveillance, as defined by the Merriam-Webster dictionary, is the “close watch kept over someone or something.” That’s a fairly basic explanation, but it is entirely accurate. I think it is probably fair to say that when most people think of “surveillance” images of detectives and spies come to mind. Unfortunately, this somewhat romantic notion is not entirely accurate anymore. Today, we are under surveillance the likes of which would make the Stasi blush. Whether you consider him a traitor or a hero, when he blew the whistle on NSA surveillance activities, Edward Snowden in many ways opened up the eyes of the American populace. He showed that the NSA was using mass surveillance tactics to spy on everyone, from enemies of the state and terrorists, to our own allies in the European Union and even American citizens. But it wasn’t just the government that was spying on us. The website “crackedlabs.org” shows just how extreme corporate surveillance can be. Through a complex system of tracking and trading, they can influence us and infer very personal information from us based on our online presence. Thankfully, we can take steps to protect ourselves and ensure our privacy through surveillance of our own.

Using surveillance as a form of protection is a bit of an interesting concept, as it seems rather unconventional at first glance. But by doing this, one can very efficiently protect themselves online. This does not require one to be some expert hacker or data guru, all it really requires is a basic understanding of computers and bit of awareness both offline and online. Offline, you can take measures such as paying only with cash and keeping an eye out for Closed-Circuit Television, or CCTV cameras, which according to facilitiesnet.com are divided between Analog and IP-based cameras. Analog cameras, again according to facilitiesnet.com, “…have been around for years.” These are the cameras that are all local and store their footage on-site. They are still the most common type. IP systems are newer, offer better resolutions, and “allow user to e-mail video images for consultation.” So they’re much more advanced, and you can probably expect CCTV systems to become even more advanced in the future. Something else you can do to limit your offline presence, though it may be extremely inconvenient, is deciding to use cash instead of a debit or credit card in your day-to-day purchases. Naturally, in this day and age, this isn’t ideal, but it is another option you could take if you’re so inclined.

Managing your online presence is a lot more obvious, but can in many ways be more difficult. Really the first thing you should do is research to find out exactly what information is freely available on the internet. If you have a Facebook account, you can go into the settings and view the information and the categories they put you in based on post history and location tags and tracking. For instance, they are able to guess if you live away from family, or have a pet, or have friends of a certain ethnicity. The website applymagicsauce.com can tell you what personal information they can infer about you based on your Twitter activity. This is to mirror what information companies and corporations can guess about you using similar technology. The next step you can take is using certain websites, browsers, and addons and extensions to protect yourself online. The web browser Firefox is famously pro-privacy, and have also taken a stand for net neutrality. Furthermore, you can use addons such as Adblock Plus (https://adblockplus.org/) to block not only adds, but also cookies, which, according to whatarecookies.com, are small files that are used to track your online activity in order to “deliver a page tailored to a particular user.” You can also download the web extension “HTTPS Everywhere,” which, according to their homepage, “encrypts your communications with many major websites, making your browsing more secure.”

By taking these steps, you can begin to take back your online presence. Living in the age of information can be scary, in part because no one has determined which information is off limits for the general public. I think it’s safe to say that everyone has some form of dirty laundry that they don’t want made public. It’s just a part of being human. But we live in an age where we need to be careful about what information we allow to be collected and used. Websites like Facebook can gather personal information and sell it for a pretty penny to the highest bidder. Taking some of these steps can help, but ultimately what we need to do is get out and vote for people who respect and support our rights to privacy. It is only through law that our privacy and personal online security can be secured definitively. Ultimately, there are precious few other genuine long-term solutions.

 

Works Cited

“Adblock Plus | The World’s # 1 Free Ad Blocker.” Adblock Plus | The World’s # 1 Free Ad Blocker, adblockplus.org/.

Cadwalladr, Carole, and Emma Graham-Harrison. “Facebook Accused of Conducting Mass Surveillance through Its Apps.” The Guardian, Guardian News and Media, 24 May 2018, www.theguardian.com/technology/2018/may/24/facebook-accused-of-conducting-mass-surveillance-through-its-apps.

Grove, Jon. “What Are Cookies? Computer Cookies Explained.” Computer Coookies Explained, www.whatarecookies.com/.

“HTTPS Everywhere.” Electronic Frontier Foundation, 27 Mar. 2018, www.eff.org/https-everywhere.

Rainie, Lee. “The State of Privacy in America.” Pew Research Center, Pew Research Center, 21 Sept. 2016, www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/.

Szoldra, Paul. “This Is Everything Edward Snowden Revealed in One Year of Unprecedented Top-Secret Leaks.” Business Insider, Business Insider, 16 Sept. 2016, www.businessinsider.com/snowden-leaks-timeline-2016-9.

“What Does CCTV Stand For? – Security Coverage.” Facilitiesnet, www.facilitiesnet.com/security/topic/What-Does-CCTV-Stand-For–19068.

Counter-Surveillance as a form of Protection – Abrie Richison

Abrie Richison

Dr. Koellner

LGTR 250

10 December 2018

Part one: Data Diary

            The first steps I took in taking back control of how much I am being surveilled online was to decide which social media accounts I used the most. In doing so, I had to reflect on my online presence. I came to the conclusion that Facebook, Instagram and Twitter were my three most prevalent social media accounts. Once I did this, I decided to go in and activate Two-Factor Authentication so that it would be more difficult for someone to hack into my account and gain insight to my personal settings and such. Once I knew the setting I was looking for, it was not difficult to facilitate this in my social media accounts. This was my task on day one.

On day two, I went to Applymagicsauce.com and saw how I was perceived by my Twitter account. It was interesting because twitter thought that I was a male and that I was 32 years old based on my tweets and retweets and overall Twitter use. Once I saw these results, I went back through some of my content to see why Twitter would think these things of me. I noticed that I rarely tweeted personally, rather I retweeted other accounts. The accounts that I spent most time with were owned by men, maybe making Twitter think that I was also a man. It was interesting to know what they had gathered regarding my identity and then to go back in and see what may have given them that impression.

On the third day, I did some research on Ad blockers and what that service entailed. Interestingly, I sometimes enjoy the adds that pop up on my social media accounts because they are obviously tailored to my interests and needs as a social media user. Rather than apply the Ad Blocker to my phone, I just researched it from the outside to see how it would benefit people who did not want these ads. Ad blocking is very effective and one of the most popular blockers I found was AdBlock Plus.

On the fourth day, I really focused on Facebook and who could see what posts of mine, as well as what accounts were connected to my Facebook account and sharing information. I found that some of my posts were being shared with people who were not in my “friends” list – meaning that people outside of my approved list were seeing my posts. I had a problem with this because some of my pictures or events were personal and I would rather not share them with just anyone. I then went through and made sure that only my friends could see all of my posts, rather it be something I was tagged in or something I posted personally.

On the fifth day, I researched and installed Privacy Badger. This settled my mind in knowing that third parties could no longer track the sites I was visiting and spending most time on.

On the sixth and seventh days, I researched other applications and ways to continually keep control of my privacy. While this experiment has been enlightening, I would love to continue keeping control of my privacy. I looked into Signal, Duck Duck Go and even considered YubiKey.

 

Part Two: Reflective Research Paper

          Technological advances have created an abundant increase in internet use, specifically through social media. Because of this increase, users have begun openly sharing information, location, personal photos and relationships on the internet without knowing who can see it and how these consumers can use such information. It is important to be aware of our online presence because much more of our information is being used than we think. During my research, in which I implemented counter-surveillance as a form of protection, I learned just how much about our personal lives is documental through social media. This was done through researching different applications, settings and personal social media accounts. My goal throughout this research was to gain insight into how much of my information is being harbored by third parties and to then take back control of my own privacy using useful tools. By focusing on Facebook, Instagram and Twitter, I was able to gather information regarding privacy and just how much of it we are lacking as social media users.

All of the three social media accounts that I focused on – Facebook, Instagram and Twitter – have their own privacy settings. I learned that when you make an account, these accounts fail to offer much aide in your account’s privacy. Users are able to easily access their ability to make an account private but that is typically the extent of their privacy settings endeavor. What users rarely utilize, me included, is the extent of their ability to make their accounts more private. For instance, Two-Factor Authentication, a security step in which users are required to identify themselves in two ways to log into their accounts, is available on many social media services but not well advertised. Though some companies are becoming more transparent with their privacy settings, there are still unpredicted breaches of security that have exposed user’s information to the public.

One of these breaches that completely effected the privacy of users was the Cambridge Analytica. In a New York Times article titled “Cambridge Analytica and Facebook: The Scandal and the Fallout So Far,” written by Nicholas Confessore, the scandal is exposed and discussed. News broke in mid-March 2018 that Cambridge Analytica, a London based data-mining firm, lifted the Facebook profiles of millions of users without their consent for political purposes related to an upcoming election. Documentation surfaced and proved that a former board member at the London based firm, Stephen K. Bannon, pulled users information in hopes to “build voter profiles” (Confessore). In doing so, he breached Facebook’s privacy claims and put millions of users at risk. Users began to protests Facebook as Confessor states when he writes, “The Times reported on a growing number of Facebook users, including singer Cher, deleting their accounts – and broke news of departure of Facebook’s top security official, who has clashed with other executives on how to handle discontent” going on to mention, “The hashtag #DeleteFacebook began trending on Twitter” proving the uproar that took place after the breach. From this quote, it is adamant that users were not pleased with the breach in their personal information and even used other social media platforms to express their unhappiness. Because breaches like this are possible, it is abundantly important that we take back our privacy as users in order to protect it ourselves.

There are plenty of ways to take back our privacy as users. There are applications that can be downloaded that aide in the containment of privacy as well as browser extensions that can be added to search engines. For instance, Ad Blockers are available that will block ads from appearing. There is a certain software, called AdBlock Plus, that prevents third parties from being able to gather information from you and then tailor the ads to that personal information. While this is just one thing we can do, there are many things that can protect our online presence. However, I do believe that there should be 5 rules for equity and fairness when it comes to data sharing.

The first of these rules is to implement more transparency between companies and users. In doing so, users will know what they need to accomplish on their end to achieve total privacy of information. Companies, like Facebook, Instagram and Twitter, should have a more open communication with their users, working with them rather than separately in obtaining privacy. I think another rule that would be beneficial is for Two-Factor Authentication to be implemented at all times, rather than just when the user finds out about it. If users began their online experience with Two-Factor Authentication, then a majority of breaches and hacks would be prevented. Another rule would be for users to know who is viewing their content at all times. This would eliminate any questionable viewing of user’s information. The fourth rule I would like to see installed is less connecting of accounts. In connecting your Facebook account with other accounts, users are at a higher risk for one of their accounts to be hacked, therefore, the other accounts being hacked as well. Though we are informed of data sharing that leads to ads, I think a fifth rule that would help the overall usage of social media is for users to be more educated as to what is being shared. I think a simple, easy-to-read terms and agreement that details exactly what will be kept private and what will be used to public use would help in overall online experience in relation to privacy.

Some techniques that I found especially helpful were Duck Duck Go, Applymagicsauce.com and Privacy Badger. I began by uncovering my online presence from an outside source, such as Applymagicsauce.com. This site allowed me to connect my Facebook and Twitter accounts in order to gather information about my data double. What they found from my accounts surprised me as it was much different than what I expected. For instance, with my twitter account they believed I was a middle-aged man. This was interesting to me until I viewed my own account from the perspective as an outside source. In doing so, I could see how they gathered these assumptions based on what I retweeted and who I followed. In knowing these interpretations about me, I am now able to alter what one could gather from my Twitter account because I have more knowledge from Applymagicsauce.com. After doing this, I became much more intrigued with my online presence and decided to investigate the capability of Duck Duck Go and Privacy Badger. Duck Duck Go is search engine that blocks trackers and eliminates the possibility of other people using your information. They market themselves in a way that expresses tracking as “creepy” and shows how they never track your searches, hoping to leave users feeling more protected in their online experience. They just launched a new mobile app in 2018 that makes it even easier for users to use Duck Duck Go. Comparatively, Privacy Badgers is a browser add-on that prevents third party trackers. Both of these counter-surveillance techniques are beneficial for user’s experiences.

Overall, gaining control of our data doubles is very important as internet use is abundantly predominant in our culture today. Whether or not we realize it, our privacy is not always guaranteed online, meaning our personal information, relationships, interests and much more is being shared with undisclosed parties. Because of this, counter-surveillance can definitely protect us online. As my group members also learned, it is much easier than we thought to take back our online privacy. From this course, through literature and our own outside research, we have seen many instances of extreme surveillance. Whether it be from the government, like The Method or “In the Penal Colony”, one man, The Sandman, or many people, like in “Up in the Gallery,” surveillance is all around us; it is all encompassing. There are few ways to escape surveillance in today’s society but there are steps we can take in preserving our privacy to the best of our abilities.

 

Works Cited:

Confessore, Nicholas. “Cambridge Analytica and Facebook: The Scandal and the Fallout So Far.” The New York Times, The New York Times, 4 Apr. 2018, www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html.

 

 

 

 

 

 

Houston Sorrels

Data Diary

Day one (Dec 3)

    Today I focused on my mobile phone settings. Going through them I realized I had mindlessly given apps various permissions that, when I took the time to actually consider why they needed these permissions, were not strictly necessary to get what I needed out of them. For example my phone dialer wanted permission to use my camera, and netflix wanted permission to use my microphone; these were just two examples of permissions that I had given that seemed strange to me, but by going through and denying certain apps certain permissions, I can help to ensure that data isn’t passively being collected against me when using services that are apart of my daily life.

Day two (Dec 4)

    Today I focused on my browser. One app I downloaded for it that was recommended in The Privacy Paradox was Privacy Badger. It’s an app that monitors websites and reports what cookies they are trying to collect, and if they are attempting to track you. A lot of these things occur behind the scenes in everyday browsing, so it was interesting to have it brought to my attention again, just how much data I was allowing to be passively collected against me simply by browsing the web. Pages that contained tweets, such as news articles, still produced trackers for Twitter, the same was for Facebook of course.

Day three (Dec 5)

    Today I focused on social media. My Facebook is deactivate, but I actually reactivated it temporarily to see what information they had on me. Possibly because I haven’t used it in awhile, the information it has on me is quite random, some of it is accurate, while some of it is totally off base, but nonetheless it was interesting to see how the information was collected. Some from liking pages related to topics, some from interacting with ads, and some simply for “interacting with pages”. Outside of Facebook, my only other social medias are really Instagram, with my profile set to private (even though facebook probably hogs some data from that), and Reddit, which isn’t really forthcoming about the data they collect on users, although I’m pretty much a lurker.

Day four (Dec 6)

    Today I focused on my email. After the GDPR went into effect in the EU, I received a tooooon of emails from websites I had visited asking to agree to new terms and conditions, blah blah blah, so I actually went through those and unsubscribed myself from quite a few sites to cut down on all the useless emails I never read anyways. I use Gmail, so I’m sure Google is busy at work harvesting data there, and in fact I’m sure of it because often times emails with dates or phone numbers, I will get notifications asking if I want to “add to calendar” or “add to contacts,” and that wouldn’t happen without a second set of invisible eyes recognizing the info in my emails. I should be careful of how I talk about Google; both my phone and laptop run on Google operating systems, and I have the Google Home speakers in my house as well…

Day five (Dec 7)

    Today I focused on my bank information. I’ve never had an issue with my bank accounts being compromised, so I know at least on that front I’ve done a good job of protecting myself (outside of the one time I swiped my credit card on a skimmer, but that got resolved really quickly). Mainly I was interested in seeing what companies had my bank information stored so they could make recurring charges to my account, and it seems the only ones I have are from Google, Capital One, Ally Bank, and Metro by T-Mobile, so at least these companies have done a good job of protecting my information, although behind closed doors I’m sure they inevitably sell bits of it to third parties to advertise to me online.

Day six (Dec 8)

    Today I focused on “group data protection.” This stuck out as important to me because although I may be taking efforts to protect myself, certain aspects of digital privacy require parties on both ends to take steps to be effective. One app I’ve started using, and one that I have gotten friends to start using is Signal; it’s a messaging app that offers end to end encryption, so I can feel more confident in knowing that only myself and the person I’m communicating with are reading the messages, not the NSA, and not G-who-shall-not-be-named (still gotta be careful).

Day seven (Dec 9)

    Today I focused on reflecting on my progress. From what it seems before this week I had a “digital filing cabinet” that I would just leave unlocked to be viewed by anyone interested in my information. Although I can’t completely lock it, I’ve definitely taken steps to make sure I know who has access and whether or not I feel comfortable with the level of access they have.

Houston Sorrels

Dr. Koellner

German Lit in Trans

10 December 2018

Digital Privacy Reflection

    We live in an age where one’s private information can no longer be contained within the contents of a fireproof box locked within a home office; an Email address had become a “digital fireproof box” of sorts where an individual receives communications from healthcare providers, financial institutions, business correspondents, and of course friends. With the creation and widespread adoption of digital commodities and services, it has become nearly impossible to live a life that is “off the grid.” Life on the grid, however, does not mean one must forgo the benefits of informational security; one must simply learn to adapt and utilize these new age securities so that he or she does not miss out on the various benefits and conveniences the digital age has brought forth. The goal of this paper is to show what forms of counter-surveillance can be utilized in order to bring one’s digital privacy back into his or her own grip.

    In this essay counter-surveillance refers to the steps taken to understand how one’s digital information is collected and redispersed for the benefit of corporations through marketing, both at the individual and macro levels, or governments, and how an individual can take steps to find this collection of data and decide what information they are then comfortable with sharing. Directly preceding the writing of this paper colleagues of mine, as well as myself, were tasked with keeping a digital diary to document what information we found that was being collected on us, and the steps that we took in turn to take back control. One of the first steps I took was to go into my phone settings and restrict various app permissions that I felt to be unneeded in my day-to-day routine. There was no need for my phone dialer to have access to my camera, just as there was no need for Youtube to have access to my messages. Taking this one step of limiting these permissions can have large effects on minimizing data being collected an individual, especially when it has become common to have one’s phone at all times.

    To take things a step further, one may consider various apps or browser add-ons to help protect against passively sending data out about oneself that could be picked up by other entities. Firefox is a great browser choice in this regard as they have widely be associated with protecting and helping the end user, add-ons like Privacy Badger go a step further by showing you what trackers and collectors may be on a webpage that aren’t outwardly apparent, and giving you the option of limiting just how much can be collected. An app I found personally useful and highly important was Signal; Signal is a messaging app that offers end-to-end encryption, meaning the users can rest assured knowing that only the person reading their messages, are those for which they are intended. It must be noted though that in order to have this end-to-end encryption, both parties must use the Signal app; you’ll know messages are encrypted when the locked icon appears in the bottom right corner of the sent message.

    It is interesting to analyze the ways my colleagues and myself went about reclaiming our digital privacy. We all seemed to have drastically changed our online browsing habits by either downloading different add-ons to stop ads, trackers, and data collection, or downloading entirely new browser all together; our mobile habits also certainly changed with some of us changing passwords, others changing apps we use to communicate, and pretty much all of us going through our setting to see what we were allowing or forbidding. Two things I thought interesting that my colleagues did but that I did not do included going “cardless” for a day so that financial transactions could not be traced outside of ATM withdrawals, and examining where video cameras were placed in the public to see where we were being recorded. At the end of it, we all seemed to have ended up in relatively the same position, even though we may have not employed the same tactics to get here, and it is a position in which we are more aware of the digital world around us, and how we must take steps to secure our privacy within it.

    Just as how one must be responsible to handle personal, private documents with care, one will only have as much privacy online as which an individual is willing to commit. There are undoubtedly trade-offs that come with setting these personal limits, and they will surely differ from individual to individual, but they definitely do not come as the standard. When one uses a service that appears to be free, that individual must be the product to someone else. After committing to this data diary project, I developed five rules for myself to adhere to in order to protect my digital privacy; some of these rules I already subliminally followed, and some were created due to the realizations with which this project presented to me. The rules are as follows: 1) If I wouldn’t be comfortable shouting certain information about myself in public, I should not allow it to be accessible online, 2) if a company is not forthcoming about how they intend to use my information, then they should not have my information, 3) I should not need a lawyer to understand the terms and conditions of a website, if I do, then they probably should not have access to my data, 4) Actually read the app permission requests to see if they seem reasonable, 5) If I am able to give permission to have my data collected, I should be able to at any future time have permission to stop such collection.

   

Counter-Surveillance as a form of Protection.

Group 2: Counter-Surveillance as a form of Protection

Part 1: Data Diary

Day 1: Change Privacy setting on Facebook and Firefox browser. This would be the first step in creating a more private world. I found that changing my settings were pretty simple to do. However, I learnt that Facebook categorized me and were mostly inaccurate. I also became aware of how my data was interacting based on the websites I visited.

Day 2: Privacy Badger. This seemed like a good next step to take in providing knowledge about who can see my data and who can access what I’m doing. Downloading this little fella was extremely simple. I found that a lot of sites I visit keep track of where I go, and Privacy Badger managed to block many advertisements that did not respect my “do not track” settings. This has helped me become a little more invisible to advertisers while reminding me that they’re still there in case I ever want to change my mind.

Day 3: Signal. This was a good use for my everyday life. Using this app was able to provide a security that I did not have before. I was able to send text messages to others that I convinced to download the app and if one did not have authorization to access the conversation they could not (I tested that as well). Once again simple to access and download.

Day 4: Duck Duck Go search engine. They encourage you to protect your data, so using them to search the web for information was interesting. I found that both DuckDuckGo and Google have the same information without the creepy following factor. I was still able to find news articles, scholar articles, recipes, etc. Also, there was a “hack” to using duckduckgo, if you couldn’t find what you were looking for you could do a google search within duckduckgo and still have your data protecting.

Day 5: Tor browser. This works a lot like the signal app but specifically for internet usage. Router WIFI number wasn’t recognized so advertisers couldn’t target me for their products. Was able to replace my Firefox for the day and found that Tor provided more privacy in the site I visited. Simple to use, it’s a search engine. However, after further exploration I did become aware that Tor uses “volunteers” to bounce data traffic around which left my data exposed to the “volunteer”.

Day 6: Applymagicsauce.com. I do not use my twitter often, but they did not have the Facebook option available. So, I analyzed my digital self with what twitter information there was. The applymagicsauce was not that accurate (i.e., conservative personality and age wrong) but held some truths (i.e., other top 5 personalities were semi correct).

Day 7: Cash transactions only. This was not easy but enlightening. The only thing that was tracked was when I pulled money out of my account via ATM, other than that my bank had no idea what, or where I was spending my money. It gave me a sense of privacy as well as provided me with more security while purchasing items (you can’t hack cash).

Part 2: Reflection Paper

 

Counter-Surveillance as a form of Protection

April Alvey

            Counter-surveillance can be understood as measures taken though methods and devices to evade or prevent surveillance (Merriam-Webster.com). For this project, I will be using different forms of devices and methods for 7 days to gain more knowledge and control over my digital data. I will be addressing a few types of methods and devices I used to achieve more privacy and awareness of how my data is used. I will also acknowledge some of the limitations that I have found with some of the methods used throughout this project. I will compare my experiences with this project to those in my group and/or reviewers of the methods/devices. I will finally create my own personal terms of service and 5 rules for equity and fairness for data sharing. By the end of this project, I will have gained knowledge and control over my data as well as provided a better understanding of my digital self.

The first method I engaged with was the privacy setting on my Facebook (Stokes, 2018) and Firefox (Taylor, 2018) browser because this seemed like a good place to start in regaining control over my data. By changing the settings on my social media and browser I will create some privacy in what I search for. The main goal for this was to gain some control over who can see what I do. I found out that Facebook was categorizing me based on the information gained through my page and advertisers were able to target me based on the products I would search for using Firefox. The value in the data information gained highlights the visibility advertisers have on users and the relationship between Facebook and browsers like Firefox are geared towards taking advantage of their users. A limitation I found to using this security measure is what information is already accessed cannot be made private although you can request for the information already gathered on you.

The next device I engaged with, and found to be the most useful, was the Privacy Badger (Electronic Frontier Foundation, 2018) because this add-on provides better protection of my data, control over access to my data, and awareness of what websites are violating the privacy settings on my device. The Privacy Badger gives me the option to control who sees my data while still allowing approved sites or organizations to access my information. I found Facebook, Google, and unknown trackers were tracking a lot of sites I was visiting. Facebook and Google were rated by Privacy Badger as the worst perpetrators. A limitation with Privacy Badger was that it could only prevent future violations of my privacy, but any data previously collected could not be reclaimed.

Another useful device that I used to provide better protection for my data was the Signal application (Signal Messenger, 2013). By using the Signal application, I will be able to privately carry out various types of conversations by allowing the data used to be encrypted and not stored on servers. I found that Signal can help protect all information stored on phone such as my card information and all messages used through the app. Signal also makes it difficult for those trying to access conversations or information without permission. Limitations, if recipient does not use signal than messages are not encrypted. Another limitation to Signal, is that your identifier is your phone number, which could be a little off putting.

Another device I used for this project was Tor (Tor Project). Tor is a search engine that uses a relay connection to mask the IP (Internet Protocol) address. My router WIFI (wireless communication tool) number was not recognized which provided me with protection from advertisers targeting me for their products. Tor can allow an individual to evade being tracked by organizations. I found the privacy intriguing and was interested in learning how Tor can function in such a manner. A limitation to Tor is it can be abused by the volunteers that are the relay points because they will have access to your traffic data.

The method I used for this project that provided the most data protection but was also the most difficult to use is Cash transactions for a day. By participating in cash only transactions, I would be providing myself with the most data protection possible, since cash cannot be hacked. My bank was only aware of when I pulled money out and how much I was intending to use. While using cash I found that my bank account was better protected because my card information could not be copied and used by another individual. However, the limitations of using cash only is that if the purchasing items cost more than the amount of cash on hand the individual will be forced to decide which items will not be purchased at that given time. Another limitation to cash only transactions is if I were to have been robbed I would permanently lose all that money, unlike cards the bank could not refund the money or track the perpetrator.

I was unable to obtain information regarding this project from my group members (they did not post data diary to google doc) so my experience with this project was compared to those who have used the applications, add-ons, browsers, etc. I found that many users reviews have be largely positive of the add-ons, and applications I used. Such as in the use of Privacy Badger, many users agreed that he has been very helpful in blocking access to their data from organizations. The Signal application was largely liked however, showed some conflict with other applications downloaded onto the device, I did not experience this conflict. Many individuals felt they have regained their privacy with the use of these devices and methods. The web browsers that were used for this project had great approval from other users. However, many reviewers of Tor and DuckDuckGo liked the knowledge that their data was not saved to the servers but that encroach on the saving of information to logins/passwords for numerous accounts, I believe having to keep up with login/password information to be a “worth it” sacrifice for my data privacy.

The podcast The Privacy Paradox has introduced numerous was to regain control over the digital data double that has become a part of everyday living. I used The Privacy Paradox to access various types of tips and suggestions and listened to the broadcast to gain better understanding of how our data is tracked and used. Angela Richter’s Supernerds provided examples of how easy it is to gain information on people through actions taken daily by the individual while highlighting that public access allows some information (i.e., homes address) to be viewed by anyone. Both The Privacy Paradox and Supernerds highlight the modern day worries of invasion of the private space we each have.

By the end of this project I have gathered enough information to form my own Terms of Service agreement based off 5 rules for equity and fairness when it comes to the access of my data. First, any organization who wants to access my data must request for permission to view my data. My information belongs to me and I believe no organization should be allowed to profit off my data without my permission. Second, if an organization wants access to my data I can grant them as much or as little access as I see fit. Depending on the specifications of the request, my data could allow corporations to target me or categorize me inaccurately which would lead to a false representation of myself to the digital world. Third, I can control how long an organization has access to my data. To be granted access to data in general without a time line could include access to future data which would create an issue with my privacy. Fourth, I can terminate any contact and access an organization has with me and my data. If I do not feel that my data or myself is being treated fairly or respectfully, I can end the connection permanently. Fifth and final, if I have signed up to any application and wish to leave, I will be able to take my data with me. My data is a part of me, it represents a digital version of myself and should be treated as a part of my being, so if I leave a site, or application, or add-on or etc., I should be allowed to take all information of mine with me.

 

 

Resources

“Countersurveillance.” Merriam-Webster, Merriam-Webster, www.merriam-webster.com/dictionary/countersurveillance.

Inc. “Tor.” Tor Project: Overview, www.torproject.org/.

“Privacy Badger.” Electronic Frontier Foundation, 24 Oct. 2018, www.eff.org/privacybadger.

“Privacy, Simplified.” Gentlemen Prefer Blondes at DuckDuckGo, duckduckgo.com/.

Richter, Angela. “Supernerds.” Sign in to Your Account, Nothing to Hide Blog, 9 Aug. 2018,             cofc.mediaspace.kaltura.com/channel/LTGR 250: Nothing to Hide/96423631.

“Signal >> Home.” RSS, Signal Messenger, 2013, signal.org/.

Stokes, Natasha. “The Complete Guide to Facebook Privacy Settings.” Techlicious, Techlicious, LLC, 20 Mar. 2018, www.techlicious.com/tip/complete-guide-to-facebook-privacy-settings/.

Taylor, Sven. “Firefox Privacy – The Complete How-To Guide.” Restore Privacy, 1 Dec. 2018,               restoreprivacy.com/firefox-privacy/.

Zomorodi, Manoush. “The Privacy Paradox Tip Sheet | Note to Self.” WNYC, WNYC Studios, 10 Feb. 2017, www.wnyc.org/story/privacy-paradox-tip-sheet/.

 

Surveillance project

On the homepage of MyCharleston, the online portal for students and teachers, you can see a live stream of the cistern. This means that there are cameras hidden, that overlook the yard. Through the the life stream, you can see a building to the left and the pathway that run towards the front, with the view expanding to the street. Without seeing this life stream on the homepage, I would have never known that there were cameras in the cistern.

 

 

 

After further research, I found that the College of Charleston has multiple webcams placed throughout campus. Anyone is able to access the live cameras through the CofC website by simply searching for them on google. The site states that the cameras are there “to provide live, streaming video 24/7”. The website does not state many uses of these cameras, but I am sure they partially serve as a tool to keep an eye on students.

 

I live in an off campus apartment but the building is filled with a majority of college students due to its close location to the College of Charleston. Throughout the halls there are security cameras which make the building feel safer. Currently, the cameras are being replaced so there are none on the ceilings of the hallways. There are also security cameras in both of the elevators. I have not seen any cameras in the stairwells which is surprising to me considering the high levels of surveillance in other areas of the apartment building. The purpose of these cameras are likely to keep an eye on residents and to make sure no one is doing anything harmful or dangerous.

 

 

My roommate works at Francesca’s, a little boutique on King street, where they sell many different clothing items and accessories. In many stores, there are security cameras dispersed throughout the floor in order to prevent thefts. I went into her work place to take pictures of some of the security cameras. Despite the security cameras placed through the store, my roommate talks about how there are still a lot of people who steal items from her workplace.

 

 

On the CofC website there is a map of all the places crimes have occurred. The map is titled “Campus Incident Map”. The most abundant crimes are Vandalism, Theft, Narcotics Violation, and Traffic Offense. I am sure cameras were used in the process of catching the suspects, and today many traffic lights have cameras on them, making it easier to monitor and control traffic violations. I believe that as time goes on, security increases, due to the developing technologies.

 

There are many “blue lights” placed throughout campus, most of them being in cougar mall, which is where our classroom is located. These lights are there in case of emergency, and help will come to the location where the button was pushed. This is not a surveillance camera but it is device that aids in crime prevention and provides information of a location, making it a possible form of surveillance that is used only when necessary.

 

 

The College of Charleston provides an annual security report where they list parts of campus procedures, and statistics. One of the sections of the report is titled “what locations must be tracked”. I believe it is necessary for all colleges to make their main priority safety of the students and staff. I think it is a positive thing that cameras are placed throughout campus in order to keep an extra eye out to prevent crime and to help solve cases if something does happen.

 

 

 

Nikita Eglis

Professor Koellner

December 10, 2018

                                                   (In)Visibility as a Form of Protest

 

Closed Circuit Television is defined as “the use of video cameras to produce images for display on a limited number of screens connected directly to a non-broadcast transmission system (encyclopedia.com)”. The many cameras placed around campus can be seen through the College of Charleston Website, and after researching the purpose of CCTV, I would not categorize the cameras shared on the college’s website as part of this system. CCTV systems are only able to be seen through a few screens, intended for specific people like police officers, security guards, or employees(encyclopedia.com). The security cameras where I work are used to monitor activity in the store, and are connected to a small screen in the back which shows different angles and areas of the store. Digital video surveillance is described as a system that “enables embedded image capture capabilities that allows video images or extracted information to be compressed, stored or transmitted over communication networks or digital data link (webopedia.com).” This definition is more vague than closed circuit television, and I think all modern security cameras would fit under this category, whether the footage can be viewed by a lot of people or not.

 

Majority of the College of Charleston Campus is monitored by cameras. The College of Charleston website provides twenty four hour live video surveillance of the popular spots on campus.This footage can be seen by anybody who google searches the school’s cameras. I am assuming the cameras are used in order to keep an eye on students, while also allowing the public to view what occurs in these busy spots around campus. The goal of these security cameras throughout campus is not just to track activity, but to also provide the public with more information than they would have without the use of this online tool. At Yale, students were interviewed on their opinion of security cameras around campus. One student said he felt as if the cameras were an invasion of his privacy, while another student felt that if they were made visible, she would feel more comfortable (yaledailynews). I disagree with the fact that the cameras are an invasion of privacy and believe they are necessary in order to to solve and prevent crimes.

 

In other places around Charleston, such as shopping stores on King Street, there is closed circuit television systems. Where I work, there are many cameras placed throughout the floor and they are all connected to a mini television in the back. These cameras are solely used for the purpose of preventing crime. When I see cameras anywhere in public I only associate them with crime prevention. I believe that cameras are important to have in very busy, public places where it is hard to keep track of everything going on. I do not ever feel too watched, but I believe that technology could advance to a point where there is too much surveillance, which has the potential to make people uncomfortable.

 

Throughout this course we have talked about many different forms of surveillance and the ways in which it makes people alter their behaviors. I believe that the many cameras on campus may prevent the way some people act in front of them, and some will act completely different when not under the eyes of the camera. This could help prevent crimes from happening, but also could have negative effects if a crime takes place where students know surveillance is not present. On my way back from class, I tried looking for the camera that provides twenty four hour video surveillance of the cistern online, but could not find it. Although these cameras are hidden, the school has still made it known that they are there. The fact that the public has the ability to find out where cameras are placed around campus has positive and negative sides, but I believe cameras are an important part of campus safety whether they are hidden or not.

 

I believe areas that are the most commonly used are monitored the most because of the greater flow of traffic. A crime can happen any place, at any time around campus, so it is difficult to decide what areas should have surveillance. The College of Charleston does a good job at providing blue lights spread around campus which are used to track one’s location when an emergency occurs. They also have many cameras overlooking popular spots around campus. Through this project I learned a lot about all the information the College provides on their website about public safety and the importance of the surveillance of campus. In relation to security cameras around the college and my workplace, I never feel watched and I know the cameras are only there to keep me and the others around me safe.

 

Although I do not mind security cameras, throughout the semester I learned about other forms of surveillance that make me feel a little more watched than I would like to be. For example, I never knew that the application on my phone “Maps” tracks all of the locations I have ever typed into it. I also learned about how Facebook categorizes people based on their friends and posts they have liked. I will not change the way I act over social media in order to change the way facebook or any social media platform defines me, but I do find it is crazy that they can make assumptions about people in order to manipulate what their feed looks like every time they open up the application. During Hasan Elahi’s TED talk, he mentions how we are surveilling ourselves by taking pictures of the food we eat and the places we go. He created a project where he takes pictures of everywhere he has eaten, meals he has made at home, airports he has flown out of, and even the different bathrooms he has used. He did this after an encounter with the FBI where they questioned him on what occurred during specific days of his life (Elahi). I never thought about how recording data on our cellphones is technically a form of surveillance until I watched this video.  With advancing technologies, surveillance is increasing and occurring all over without us even knowing.

 

Works Cited

 

Beal, Vangie. Digital Video Surveillance System. www.webopedia.com/TERM/D/digital_video_surveillance_system.html.

 

“Closed-Circuit Television (CCTV).” The Columbia Encyclopedia, 6th Ed, Encyclopedia.com, 2018, www.encyclopedia.com/social-sciences-and-law/law/crime-and-law-enforcement/closed-circuit-television-cctv.

 

Elahi , Hasan, director. FBI, Here I Am! TED Talk

www.ted.com/talks/hasan_elahi?language=en.

 

Foggatt, Tyler, and Vivian Wang. “Campus Cameras Prompt Privacy Concerns.” Yale Daily News, yaledailynews.com/blog/2015/04/06/campus-cameras-prompt-privacy-concerns/.