Showing posts with label privacy risk. Show all posts
Showing posts with label privacy risk. Show all posts

Monday, December 1, 2014

Is Facebook Messenger Worth the Download?



If you use Facebook, you started getting messages telling you that a new app, Messenger, was about to be launched.  For weeks these messages would appear and for weeks I would ignore them.  Why would I need another app?  I get my private messages from Facebook, so what’s the big deal?  Well, the “big deal” came when Messenger was the only way I could access my private messages on my phone.  I clicked on the “download app” box and saw all the information it wanted and I decided that there was no way I would be downloading this.  That lasted about three weeks.  It turned out that it wasn’t as easy to just get to a computer every time I needed to read a message, so, I put on my big girl panties and hit “download”.

When I really gave it some thought, I realized that the only reason I didn’t want the Messenger app was because I felt it was asking for too much information.  Apparently, I wasn’t the only one who felt this way.  Seeing that Messenger wants to access your phone, your phone’s camera and see your geo-location, it all seemed a bit much….at first.  But, I had to face facts:  Messenger wasn’t asking for any more information than other apps that I have.  And, giving it even more thought, I understand why it needs the information it’s asking for.  Of course it wants to access your phone because that is how you are going to be getting your message.  It needs access to your camera because that is how you will be sending pictures through the app.  Geo-location?  Of course!  Without it, how will it know which of your friends is near you and available for messaging?

I then realized that I was just making excuses not to download Messenger and it was becoming an inconvenience to me.  Besides, I have quite a few apps already that need the same information that Messenger needs.  GasBuddy uses geo-location to tell me which gas stations are close to where I am and needs access to the phone’s camera so that users can post pictures of the gas stations and the price boards.  The Dunkin Donuts and Starbucks apps use my geo-location so that I can get a current list of nearby stores where I could get my caffeine fix.  They also need access to my phone to keep track of my purchases and send me coupons whenever I reach my “bonus point” goal.  Then, there’s Swarm (which used to be FourSquare).  I can check in anywhere I visit and with geo-location, it will tell me if any of my friends are at the same mall I’m at.  It will also give me a list of my “favorite” spots so check-ins are a breeze.  Candy Crush, Words with Friends, Scramble with Friends, and any other games you have on your phone all need access to your phone and geo-location.  So, if I don’t mind giving these apps access, why do I mind giving access to Messenger when this would actually be the app I would use the most?

Facebook already knows all about me, and since Messenger is a Facebook app, what would be the difference if I allowed this to have my information?  After all, it’s not asking for my Social Security number or banking information.  It started to make less sense to NOT download Messenger, so, I caved.

Sunday, September 7, 2014

Privacy Taken by Life-Logging Cameras

One of the founders of Memoto, Martin Kaellstroem, lost both of his parents to cancer when he was a young adult.  When this happened, he was inspired to create a camera that would spontaneously capture the user’s life as it is being lived.  This small “life-logging camera” is worn either clipped to your shirt collar, or around your neck on a string.  Every 30 seconds, a picture is taken and there is no off button.  Essentially, it captures every ½ minute of a person’s life
.
Now in his late 30s, Mr. Kaellstroem has said, “When you lose your parents, you realize that you don’t live forever.  It definitely affected me in my entrepreneurship.  I can’t wait until later to fulfill my dreams; I have to live my dream now.” He states that normally, people bring their cameras to special events to capture those around them at their best.  He stated, “You don’t know in advance which moments will be important in the future.  Perhaps you meet your future wife or witness an accident or a crime.  These are pictures you might want to return to.”  But, will everyone accept that they will be filmed whenever they are with a user of a life-logging camera?

This brings “Big Brother” and “The Truman Show” to life.  Mr. Kaellstroem doesn’t see his camera as a breach to anyone’s privacy; he sees it as a collection of memories.  Personally, I don’t see it that way.  I would not want to meet friends for lunch knowing that one of them is using a life-logging camera.  I’m a fairly private person and I wouldn’t like knowing that someone has pictures of every 30 seconds of me as I sat down with them for lunch or dinner.  It’s not that I have something to hide; it’s just that I don’t like having my picture taken.  To know that a picture would be taken every 30 seconds would not make me happy at all.

This life-logging camera looks like an iPod mini and gathers pictures automatically.  They are sorted by GPS location, time and lighting.  Anyone using this camera can share the pictures on Twitter, Facebook, or any other social media.  Oskar Kalmaru, who is co-founder of Memoto, likens the camera to a diary for those who are tech-savvy and who don’t have the patience or discipline it takes to keep a written diary.  He says, “I’ve failed several times when trying to write a blog or travelogue.  Older relatives managed to keep a diary over 20 years, but it’s hard with the routine.”

Monday, June 9, 2014

Something Else to Worry About: Web Bugs

Spammers use them all the time, but have you ever heard of web bugs?  Sure, we all know what cookies are, but what about web bugs?  Well, these are a type of spyware that allows a spammer to know when an e-mail he sent was viewed.  They are also used to confirm the validity of the e-mail address.

Advertisers are also using these web bugs to see which sites people are visiting and how often they visit.  By using this information, the advertisers are able to generate reports on Internet users so that related ads can be placed on each particular user’s browser.

Browsers can either accept or reject cookies, but web bugs are a different story.  They are usually formatted as a GIF (Graphic Interchange Format), which is commonly used on the Internet.  This is why a browser will normally accept the web bugs.  Even though it’s a GIF (which people associate with pictures), the web bug will go unnoticed in a spammer’s e-mail.  This is because the image is very small; usually no bigger than 1 X 1 pixel.  The image will also blend into whatever background it’s on; if the background is white, the web bug will be white.  As for advertisers, they are very clever, too.  They can hide a web bug in a site’s logo, so even though it is right in front of you, you will never see it.

If you’ve ever received an e-greeting card, you have encountered web bugs.  When a card is sent, the sender will be given an option to be e-mailed when the card is received and viewed.  This is a prime example of web bugs at work.

Because spammers are one of the main users of web bugs, concerns about privacy are high.  With the use of web bugs, a spammer will have access to an incredible amount of information about the recipients of his e-mails.  The web bugs will tell the spammer the IP Address of the computer receiving the web bug, it identifies the URL the web bug came from, it identifies the URL of the page it was viewed on and it can identify the exact time the web bug was viewed.  These web bugs are like tiny little stalkers, keeping track of your movements.

Privacy concerns also arise when a web bug is placed on a particular website.  The main concern is that an individual’s Internet browsing is being tracked without that individual’s knowledge or consent.  To make matters worse, this tracking isn’t going against any website’s privacy policy since the bugs are generally placed by third parties.  Third parties aren’t required to adhere to the privacy policy terms and conditions.

Whether they come from a spammer’s e-mail or a website, these web bugs are putting everyone’s privacy in jeopardy.  Personal information is being gathered, yet there’s nothing you can do to stop it.  One thing you can do to help guard against the web bugs is to turn off your browser cookies.  A safer option would be to use a proxy server.  With a proxy server, you and your activities can’t be tracked by web bugs because it’s not your IP Address that is being tracked; it’s the IP Address of the proxy server.

You can also keep your privacy secure by using the proxy servers of Privacy Partners.  They offer a FREE trial so that you may see firsthand how using a proxy server can work to your advantage.  Besides changing your IP Address, each connection is encrypted and NEVER monitored, so you can be sure that your information will be safe. 

Tuesday, May 13, 2014

Is Your Baby Monitor Safe?



As if new parents didn’t have enough to worry about, now they have to worry about hackers taking over their baby monitors.  In August of 2013, Marc Gilbert, a father in Texas ran to his daughter Allyson’s room when he heard a voice saying, “Wake up, you little slut”.  When he got to the room, he realized that someone hacked the baby monitor, took control of the camera and was watching his little girl.  When he went to unplug the camera, he watched as it turned to see what he was doing.  Little Allyson slept through the incident, but Mr. Gilbert made sure that he had tighter security and firewalls installed on both the monitor and his Internet.

The baby monitor used by the Gilberts was made by Foscam and connected to the Internet.  This particular monitor was known to have security issues, but since they didn’t buy the monitor directly from Foscam, they never received the company’s email regarding an available update that corrected the problem.  As of today, there are estimated to be another 40,000 monitors that can still be hacked.

Just recently, a hacker found one of those monitors in Cincinnati, Ohio.

In April 2014, Adam and Heather Schreck woke up to the sound of someone yelling, “Wake up, baby!”, coming from their 10 month old daughter’s room.  The parents rushed to the room and were horrified when they realized the voice was coming from their baby monitor!  The monitor’s camera started moving and pointed right at them while the person on the other end of the monitor continued to yell obscenities at them and the baby. 
 
This could be the same person who hacked the Gilbert’s baby monitor in Texas or it could be a copycat, but they will never know.  In order to remove the threat, the Schrecks quickly unplugged the baby monitor.  Marc Gilbert also unplugged his daughter’s monitor.  Unfortunately, by doing this, all information stored in the monitor, including the log of IP addresses that accessed it, are erased, making it impossible for the police to trace who is responsible.

Sunday, April 6, 2014

Google Glass: Innovative or Creepy?



In 2012, Google began testing and demonstrating a new product that they call “Google Glass”.  Google Glass is a device that is a very small display screen and it is made to be worn either by itself, or hooked on to a pair of glasses or sunglasses.  The device will show the user the time, give directions, search the Internet, send messages and take photos and videos.  This is all done hands-free.  Just speak and Google Glass will do as you ask. 
  
Since its debut, there have been around 8,000 Glass wearers.  Last year, at SxSW (an annual conference featuring music, films and interactive technology), Google Glass was seen everywhere.  The same was true of this year’s conference.  People are curious about what it’s like, but most find it pretty creepy.  But, why is it that most people find it creepy?  After all, it’s just a small piece of glass that sits near the wearer’s eye.

When you see someone wearing Google Glass, whether they are sitting across from you at a table or simply walking past you on the street, you never know what they are doing on the device.  They could be reading texts, doing research, or they could be doing nothing at all with it at the time.  When someone walks by you wearing Google Glass, you would never know if that person has just taken a picture of you or even shot a video as you were approaching each other.  This is what makes it so creepy.  In fact, many people feel uncomfortable even coming close to someone wearing Google Glass.

Google Glass makes people so uncomfortable that some have been told to leave stores, clubs and even meetings at work if they didn’t remove the device.  Wearing Google Glass at an airport could cause problems as could driving while wearing the device.   In fact, Cecilia Abadie was the first person to get a traffic ticket while wearing Google Glass.  She was initially stopped for speeding in October 2013, but when the officer saw that she was wearing Google Glass, he added a ticket for the violation “monitor visible to driver”.  Ms. Abadie took the matter to Court in January 2014 and was found not guilty.  The officer had no proof that the monitor was turned on at the time of the incident.

When it comes to discussion groups about Google Glass, there are two views:  Google Glass wearers love the device, but those interacting with them don’t like it at all.  In fact, they barely tolerate it.  In social situations, non-wearers get a feeling of paranoia because they feel they are always being “watched”.

What’s odd about all this discomfort is that those who say they don’t like the feeling that they are being recorded by Google Glass wearers don’t think twice about being recorded other ways; like with a smart phone or security cameras.  Of course, the difference here is that with a smart phone or security cameras, you always know when you are being recorded.  With Google Glass, you would never know.  So, I guess the feeling of unease isn’t from the fact that they could be recorded, it’s from the not knowing if it’s happening or not.  
Google Glass wearers don’t see an issue with each other because they know how the device works.  However, if you have never worn Google Glass, and you are talking with someone who wears it, all you see is this small piece of glass and you can’t help but wonder if your conversation is being recorded.

Friday, February 28, 2014

How Else Will Your Privacy Be Taken?



In the article Looking for a Job?  Beware of this Privacy Risk, you learned how looking for work could lead to a breach in your privacy.  This is a risk for only those who are currently looking for a job.  There is another privacy risk that should be a concern to everyone, regardless of age or state of employment.  Employers and schools are demanding to know your social media information.

Many companies do not want their names mentioned in social media unless they have control over what is being said.  The only way these companies have to keep control over this is by checking each employee’s social media accounts to make sure nothing derogatory is being said about the company.  Because anyone can set privacy controls, the only way to know everything that an employee says on social media is to have full access to the accounts.  That is why employers are asking for the log-in names and passwords of all employees. 
 
Employers are not only looking for what is said about the company, or if the employee has the company name listed as their place of employment, they are also looking for anything inappropriate that may be posted.  Pictures of wild parties or visits to a nude beach may just get you fired.  True, these parties and beach pictures were taken on your leisure time, but now, unless you have a contract, you are considered an “at will” employee.  This means that your employer can terminate your employment for any reason.  Even if you have a contract, most of them have a morals clause, so any inappropriate postings could void the contract.

Monday, February 3, 2014

Losing Privacy While Seeking Employment



As we all know, the rate of unemployment all over the US is staggering.  Many of these unemployed people are without jobs through no fault of their own.  Many companies are closing their doors, and with so many people out of work and looking for jobs, this gives employers a chance to try new methods of weeding out “undesirable” candidates.  One of the methods now being used is to ask each candidate to agree to a credit check at the time an application is submitted. 
 
What does a credit check have to do with one’s ability to work?  Well, according to employers, if someone has bad credit, they are considered a high risk for corporate theft.  So, if you have bad credit, you will not be getting an interview.  By using this theory, instead of creating a time frame for 20 interviews, that number can be lowered to 5 or less with the click of a button.

True, prospective employees aren’t forced to submit to this credit check, however, if you don’t agree, your application will not be considered.  The employers hold all the cards on this. 
 
There are a few flaws with this method of choosing potential employees:

1.  Each time a credit check is run, it lowers your credit score.  Credit reporting services don’t see this as an employment check; they just see it as you looking to get approval to raise your credit limit or to add yet another credit account.

2.  If you file applications with several companies, all of which are receiving your credit report.  This means that an unknown number of strangers are privy to not only your credit score, but also know each bank and amount you have credit with.
 
3.  You will not be given a chance to explain your low credit score.  Employers don’t care WHY the credit score is low; they just care that it IS low.

4.  Employers don’t take into consideration that you haven’t paid your bills because you’ve been unemployed.  They see the low credit score and automatically assume that you will steal from the company.  It doesn’t seem to cross anyone’s mind that you want a job not to steal, but to earn money to pay your bills in order to raise your credit score.

Tuesday, December 10, 2013

Personal Information Sold at Goodwill



Have you ever donated old clothes, books, furniture or other items to a Salvation Army or Goodwill store?  Well, one donator to Goodwill in central Indiana donated a bit more than he intended.  If his donations were checked before being put up for sale, this may not be an issue.  Unfortunately, a box containing 39 pounds of one family’s personal information was sold to a woman for $27.69.

Emily Watson opened a box that she bought from a Goodwill outlet store in the Indianapolis area and found someone else’s sensitive records.  If items can’t be sold at the retail stores for any reason, they are put in bins and sent to Goodwill outlet stores.  These are closed boxes sold by the pound to anyone who wants to take a chance that there is something valuable inside.  Ms. Watson bought one such box and when she opened it found personal information all belonging to one family.  The box contained Social Security cards, tax returns, pay stubs, banking information, dental and other medical records, divorce papers and insurance documents.  There were also family photos and addresses of family members.

This had happened to Ms. Watson before.  At another time, she purchased a box containing personal information, so she opened the box in the store before buying it.  When she saw what it contained, she pulled out all the items to show a store employee, who referred her to the manager.  When the manager looked through the paperwork, she said, “It doesn’t look harmful to me.  It’s OK.”  Ms. Watson then made the purchase because she was afraid that it would get into the hands of someone not as honest as she.  She was afraid for the people the information belonged to. 

After purchasing the box, Ms. Watson tipped off WTHR Channel 13 as to her find.  WTHR 13 Investigates then opened an investigation as to the allegations made of Goodwill selling personal information.  The station sent undercover “shoppers” to three Indianapolis area Goodwill outlets and found that at every outlet location they visited, they were able to purchase someone’s personal information.  This didn’t just happen once; out of 28 visits in 2 months, personal information was purchased 24 times.   WTHR employees were able to purchase valid debit and credit cards, leases, automobile titles, medical histories, immigration papers, bills, employee drug test results, college transcripts, IRA and 401K statements and all other kinds of legal documents containing personal information. 
 
The personal information donated to Goodwill, then sold by them, contained thousands of pages, filling three boxes.  Some Social Security numbers found belonged to police officers stationed at the Indianapolis Metro Police Department.  When WTHR spoke with Sgt. Eric Eads, who is an identity theft expert in the department, he said, “Let me put it to you this way:  this is a police nightmare here.  If someone got ahold of this stuff.  It’s just shocking the amount of Social Security numbers and tax records you found.”

Another person whose tax records were found by WTHR employees is Elesabeth Leclercq.   She is quoted as saying, “It’s terrible.  I don’t even know what to say.  I’m still stunned and in a state of shock.”  Julie and Brett Snyder also found out that their information had been sold along with information on their children.  Mrs. Snyder said, “This isn’t anything we would throw away.  I mean, we wouldn’t have just handed this over to Goodwill.  It’s shocking.  We are completely shocked.”

The person whose information started it all when Emily Watson purchased it is named Rose.  She refused to give her last name, but she did give a statement.  “It’s pretty devastating and I’ve had nightmares about it” she said. 

Thursday, November 7, 2013

Grocery Shelves Will Now be Spying on Us



As if we don’t have enough to worry about, now we need to start thinking about being spied on while we do our grocery shopping.  Food giant Mondelez International, parent company of Nabisco, Kraft and Cadbury, is said to be planning on introducing “smart shelves” to grocery stores by the year 2015. 

Working with Microsoft Kinect, Mondelez International is said to be working on a system to identify shoppers walking down the food aisle.  Using facial recognition, these “smart shelves” will be able to identify shoppers by age and gender.  Once identified, a coupon will appear near a food or snack targeted to that particular shopper.  For example:  If a woman in her early 30s walks by, there’s a good chance she may be thinking about chocolate.  As she approaches the shelf for Cadbury chocolates, a coupon will pop up.

Along with facial recognition, the smart shelves will also have weight sensors installed.  This way, if a shopper over the age of 18 picks a box up from the shelf, a coupon could be sent to “persuade” the shopper into buying that product.  The coupon will come by way of either a dispenser or a display screen.  Tech writer Brian Fung of the Washington Post says of this technology, “it’s not quite Minority Report levels of creepiness, but it’s getting there.”, while Neal Ungerleider of Fastcompany.com said it’s “the ultimate in creepy, yet inevitable marketing tech.”  Personally, I have to agree with Neal about it being the ultimate in creepy.

According to Mondelez’s CIO Mark Dajani, no videos or photos of specific shoppers will be saved.  The information will only be used to collect information about the types of shoppers looking at the products or walking down the grocery store aisles.  It could help food companies with product placement so as to maximize sales.

Monday, September 30, 2013

Do You Regret Some Social Media Posts?




Every day, all over the world, people are signing on to the Internet and their social media accounts.  Facebook alone has millions of users worldwide who keep in touch with family and friends.  Then, there are those who use LinkedIn to keep up with business contacts or create new ones and still others who aren’t happy unless they check their Twitter accounts several times a day.  Do you have photos or videos you want the world to see?  No problem!  For that, there are Instagram and YouTube.  Social media is so important in our lives that most people have accounts with all of these giants.  Love it or hate it, it seems that social media is here to stay.  

In the early years of the Internet, in order to surf the web, you needed to be either home or in your office sitting in front of your computer.  Today, everywhere you look, people are on the Internet.  There are so many gadgets available with Internet access that Facebook, Instagram, Twitter and LinkedIn are available at the touch of an icon.  With your smartphone, tablet or iPod, the Internet is at your fingertips no matter where you are.  Because of this easy access, many people will hit that “Send” button without really thinking things through. 

Work can be stressful and your commute home is often the first time you had all day to just sit and relax.  As the bus brings you closer to home, you pick up your smartphone and post a rant on Facebook about your incompetent co-workers, your idiotic boss and how all the work falls on you or it would never get done.  As soon as you hit “Send”, you feel as if a weight has lifted off your shoulders.  You spend the rest of your commute either reading or catching a quick nap and in no time, your Facebook rant is forgotten.  Well, it’s forgotten until the next morning when you walk into the office and are greeted with angry stares and your boss is waiting for you at your desk with your final paycheck and your personal items packed away.  You don’t understand what’s happening and then you remember your rant.  You also remember that all of your co-workers and your boss are your Facebook friends. 
 
Another common mistake is recording a friends’ night out.  All through the night, martini after martini, you and your friends are snapping pictures with your smartphones and posting them to Twitter, Instagram and Facebook accounts.  At the end of the night, you and your friends decide that it would be “fun” to make use of the stripper pole on the stage to show your most seductive moves.  As each of you has a turn, the others are making videos and posting them to YouTube.  You and a few million others will see it the next day.  If it goes viral, maybe you’ll even see yourself on the news in a week or so. 
 
Then there are those who feel the need to update their relationship status each time they get a new girlfriend or boyfriend.  I don’t know why there is a need to let the world know that “Joanie is in a relationship with Chachi”, but, it gets posted and stays on the couple’s Facebook Timelines long after they break up.  Imagine all the relationship statuses there can be until you find Mr./Ms. Right. 

There used to be a time when drunk-dialing had to wait until you were home; today, you can drunk-dial your ex as you’re sitting at the bar!  But it doesn’t end at drunk-dialing; there is now drunk-Tweeting and drunk-Facebooking.  It’s so convenient to have this technology, but what happens when you realize that you blasted your co-worker, your boss or your significant other on Facebook or Twitter? 

Yes, social media at your fingertips turns normally reasonable people into unreasonable people.  No one seems to consider that Facebook updates and tweets in real time could be dangerous.  Letting the world know where you are every second allows you to be found by anyone.  It also lets thieves know that you aren’t home and the time to strike is now.  So, the question is:  Do you regret some of your social media posts?

Privacy is one of our most valuable commodities.  So many things can compromise our privacy, so don’t let social media be yet another risk.  Before you post anything, step back and ask yourself the following questions:

1.   How will this be viewed by my employer, prospective employer or university? 
2.   In the future, will this post embarrass me?
3.   Would I be embarrassed if my parents or children saw this?
4.   Can I lose my job if my boss sees this post?

Immediately delete the comment, video or photo if you answered “yes” to these questions.


All of us would like to keep our privacy safe.  At the top of this page there is a free download of our Privacy Guide.  Please take us up on this offer.  You will see many suggestions on how you can keep your private life private.

Tuesday, July 16, 2013

Gun Owners have the Right to Privacy, Too



Using the Freedom of Information Act, the Journal News, the leading newspaper in Westchester County, NY, requested the records for pistol permits issued in the state.  The information they received showed that there were about 44,000 registered gun owners in Putnam, Rockland and Westchester counties.  Once the information was obtained, the newspaper published the names and addresses of every one of them.  As if this weren’t enough of an invasion of privacy, along with the list was an image using Google Maps, that had each gun owner’s address pinpointed.  

New York State Senator Greg Ball was extremely frustrated and angry over this publication.  He stated, “It’s just absolutely ridiculous that the Journal News would do that and they’ve done a lot of boneheaded things in the past.”   He went on to say that he thought the act of publishing this list would give criminals a “map” to go door to door trying to get those weapons. 

Senator Ball is planning on reintroducing legislation that would make the publication of this kind of information illegal.  He said, “This isn’t only about the second amendment, this is about privacy and it’s actually boneheaded for this editorial board to take law abiding firearm owners and treat them no less than a level 3 sexual predator.”

A television news crew was sent to one of the neighborhoods that had a large amount of “red dots”.  When they knocked on doors, many people either did not answer or refused to speak, but some did express surprise and concern that there were so many guns in their neighborhood.

Friday, June 28, 2013

How is the NSA Putting Your Privacy at Risk?



Within the last couple of weeks, 29 year old Edward Snowden has become famous.  He’s not an actor, or singer, or author; his “fame” came from telling the world that everyone’s privacy is at risk because the NSA (National Security Agency) has been spying on Americans for years.  It’s the job of the NSA to keep the United States safe from terrorism.  Everyone knew without it being spoken that spying was involved, but most people were surprised at the extent of this spying.  It’s expected that terrorist groups or people with ties to known terrorists were probably targets, but no one thought that the private e-mails and telephone conversations of Joe Public would be compromised.

Anyone can be a target of the NSA.  E-mails are flagged by certain keywords that are considered “terroristic” in nature, like “bomb”, “gun”, “shooting”, etc.  Unfortunately, some of these words are used in conversation that has nothing to do with terrorism, however, an e-mail to “Aunt Sally” that talks about someone “shooting a video” near your home could lead to suspicion.  Not only that, but Aunt Sally will probably be checked out as part of your “conspiracy”.

Is there really a threat to our security or are we all simply paranoid?  According to the NSA, there have been more than 50 terrorist threats that have been discovered and blocked (one of which was targeting the New York Stock Exchange) since the spying program was started after September 11, 2001.  Knowing that these threats have been discovered and blocked, do you now feel better that the government is taking away some of your privacy?  Will you re-think some of the wording that you use in your e-mails so they won’t be targeted?  Telling a friend you went to the movies and you thought the latest hit was really a “bomb” could be re-phrased, but should we really have to think so hard about our choice of words?   Then consider your phone conversations; do you ever vent about your frustration with some politicians?  One red flag and all of your phone records will be reviewed.

Sunday, June 9, 2013

Your Old E-Mail Can be Read Without a Warrant



What do you do with your old e-mails?  Do you just let them sit in the “Read Mail” folder, or do you permanently delete them?  If you let them sit until they automatically disappear from the “Read Mail” folder, you may have a problem. 

If you have e-mail that is over 180 days old stored in a cloud server, it is considered “legally abandoned” and can be read by any government agency without obtaining a warrant.  This means that if you use Yahoo! Mail, Hotmail, AOL Mail, G-Mail, etc, your privacy could be at risk.  If you store your e-mail on your hard drive, however, a search warrant is needed no matter how old the mail is.

The law that permits the release of e-mail without a warrant is the Electronic Communications Privacy Act (ECPA), which is from 1986.  In 1986, most people who used e-mail would delete it immediately after reading it to save on computer storage space.  There was very little chance that your average citizen would have an e-mail in storage that was 180 days old. Today, however, with the use of cloud servers, storage space is just about unlimited.  E-mails are read, then left forgotten in the “Read Mail” files.  Unfortunately, the laws haven’t been updated to keep up with the rapidly growing technology.

Recently, the ACLU requested information from the IRS under the Freedom of Information Act.  In response, the IRS indicated that their criminal investigation department does read citizens’ e-mails without obtaining search warrants.  This is one of the reasons why an update of the ECPA is needed in order to protect the privacy of all US citizens when it involves any digital communications.

The ACLU also sent a request under the Freedom of Information Act to the FBI.  The response indicated warrants aren’t generally gotten, but the FBI wouldn’t come out and say for sure.  As a way of explanation, the FBI provided the ACLU with excerpts from two of its Domestic Investigations and Operations Guides; one from 2008 and one from 2012.  Both state that “FBI agents only need a warrant for emails or other electronic communication that are unopened and less than 180 days old.”  

Obviously, the time for modification of the ECPA is well over-due.  Since 1877, any government agency was required to obtain a warrant to read any personal mail sent via the US Postal Service.  Now is the time for this policy to be expanded to include e-mail and any other electronic communications.  In the meantime, if you want to keep your privacy, make sure you use the “Delete Permanently” button provided each time you read your e-mail.  For most of us, this isn’t a matter of covering up criminal activity; it’s to protect our privacy.
 Please go to the top of this page and download the free Internet Privacy Guide.  There are many other tips and suggestions on how your privacy can remain safe both on-line and off.