Please enable JavaScript.
Coggle requires JavaScript to display documents.
5/6 - TRACKING & SURVEILLANCE - Coggle Diagram
5/
6
- TRACKING &
SURVEILLANCE
INTERNET MONITORING
overview of internet comms
packets
IP
packet routing
TCP, UDP
email
SMTP
HTTP and HTTPS
service
host
port
resource
network scale monitoring &
deep packet inspection
deep packet inspection
WiFi eavesdropping
:check: wifi encryption,
WPA2, VPN, HTTPS
packet sniffing
HTTP hijacking
internet monitoring for employees,
schools, parents
spyware
preventing network
level surveillance
anonymous proxies
onion routing systems (TOR)
effective practices
:check: HTTPS, VPN, encrypting emails
WEB TRACKING
HTTPS cookies &
web tracking
web tracking beyond
HTTP cookies
LSOs (flash cookies)
Javascript, HTML5
userData
pixel hack
ETags (cache data)
browser history stealing or sniffing
browser fingerprinting
tracking email
recipients
HTML code
URL rewriting
cross device tracking
effective practices
: :check: consent
3-BLOCKING & CONTROLLING
WEB TRACKING
blocking web tracking
Disconnect
DNT failure
P3P tokens
web based privacy tools
3rd party browser add-ons
deciding what to block
blocking tracking of web searches
blocking email tracking
effective practices
:check: clear information and choice for users
:check: privacy safe default setting
:check: user should not be expected to make choices abt technologies
4-LOCATION TRACKING
location tracking technologies
wifi and cell tower
triangulation
GPS
RFID
phone tracking
metadata
location based services
social media
location based applications
tracking children and employees
location based ads
combining with data
from other sources
geographic info system
preventing and controlling
location tracking
blocking tracking
user controls
effective practices
:check: optin
:check: clear info
:check:limitations for employees tracking
5-AUDIO & VIDEO SURVEILLANCE
hidden cameras and mics
smartphones
computers
smart tvs
drones
CCTV
and facial recognition
tracking VOIP conversations
speech recognition
protecting vs audio and video surveillance
:check: clear objective and info
:check:law compliance
:check: privacy expectations
:check: purpose limitation and retention limits
6-SENSOR BASED SURVEILLANCE
ubiquitous computing
smart cities
AR
smartphone sensors
IOT, home automation
wearable devices
vehicle sensors