1. Error: Your Life Has Been Hacked
How thick is the curtain protecting your privacy on mobile devices?
By: Adelle Leonard
Image: Pexels (Unsplash)
2. “more than 90% of
Americans feel that
they have lost
control over
personal data”[1]
Image: Pexels (Unsplash)
3. Yet this is mainly due to our purchase of mobile
devices…
Image: Pexels (Gabriel Freytez)
4. 95% of Americans now own a
cellphone of some kind…[2]
Image: Pexels (Pixabay)
5. The gateway to our private lives range from our
social media interactions to the types of devices
we own.
Image: Pexels (Stokpic)
6. “ One of the largest &
most active Flickr groups,
called ‘I Ate This’, includes
more than 300,000
photos…contributed by
more than 19,000
members”[3]
Image: Canberra Centre, 2015 [4]
7. Simply from what you eat
people can get a sense of
who you areas a person
and where you have
been… ”Tell me what you
eat, I’ll tell you who
you are.”– Jean Anthelme Brillat-Savain [5]
Image: Pexels (freestocks.org)
8. Computer scientists have concluded that 12 or so
popular Android apps collected device location
coordinates accurate to within 50 meters…[6][7]
One of which is Flickr
Image: Pexels (Ingo Joseph)
10. “In previous research…[it was] found that when an
app requests location, 73% of the time it shares
the information with an advertising network.”[1]
Image: Pexels (Unsplash)
11. ”More than 80 percent of U.S.
companies have been
successfully hacked…”[8]
Which…
Image: Pexels (Unsplash)
12. Not only can strangers get a hold of your
coordinates…they can also see what you are up to
in your daily life
Image: Pexels (Tookapic)
13. Definition of Smartphone:
“a mobile telephone that
can be used to send and
receive e-mail, connect to
the Internet, take
photographs, etc.” [9]
Image: Pexels (Pixabay)
14. And “The share of
Americans that own
smartphones is now
77%...”meaning most of
us have cameras on us at
any moment in the day [2]
Image: Pexels (Pixabay)
15. With over 80% of US
companies that have been
successfully hacked, what's
not to say Apple in the case
of IPhone or Google in the
case of Android phone is not
the next? [8]
Image: Pexels (Markus Spiske
raumrot.com)
Access to your camera can easily be
achieved by an experienced hacker…letting
them see through your camera lens
16. Although… "There is a big difference between the internet
of things and other security issues…
…If my PC is hit by a cyber-attack, it is a nuisance; if my car is
attacked, it could kill me.“-Joshua Corman of I Am The Cavalry [10]
Image: Motor Trend,
2013 [11]
17. “Modern cars are
essentially a collection of
computers on wheels,
packed with many
microcontrollers that
govern their engines,
brakes and so forth.” [10]
“at an event in Singapore earlier
this year two researchers showed
off a car-hacking tool the size of a
smartphone that cost less than
$25 to build.” [10]
Image: Pexels (Tookapic)
19. As of the beginning of 2017, there are at least 1.94
billion monthly active users of the Facebook
application… [12]
Image: Pexels (Pixabay)
20. Of these users… each have their respective
recommended friends…completed with the help
of network science
Image: Pexels (Unsplash)
21. “Once Facebook knows the structure of your social
network, it can analyze it to predict not only the
people you're most likely to know now, but…
the people you're most likely to know in the
future.” [13]
Image: Career Builder, 2017 [14]
22. Goes to show…our
technologies and
strangers around the
world may know more
about ourselves than we
think…
Image: Pexels (Unsplash)
23. The wall between our private lives and the outside world
seems to be growing increasingly thin as we increase our
mobile technological use…
one would only hope that our understanding on how to protect
ourselves in this digital world also increase in future years
Image: Pexels (Unsplash)
24. Image SourcesLinks to Images (In the order they appear)
[1] https://www.pexels.com/photo/white-window-curtain-on-top-of-brown-wooden-floor-119717/
[2] https://www.pexels.com/photo/people-walking-on-gray-pavement-42384/
[3] https://www.pexels.com/photo/apple-devices-cellphone-close-up-electronics-341523/
[4] https://www.pexels.com/photo/smartphone-ipad-tablet-white-40739/
[5] https://www.pexels.com/photo/nature-laptop-outside-macbook-6508/
[6] http://blog.canberracentre.com.au/food-dining/dining/instagram-food-photography-tips/ (See ‘Content Sources’ for full citation)
[7] https://www.pexels.com/photo/woman-in-brown-classic-trench-coat-eating-mcdo-fries-during-daytime-139681/
[8] https://www.pexels.com/photo/smartphone-outside-hiking-technology-35969/
[9] https://www.pexels.com/photo/business-communication-computer-connection-261706/
[10] https://www.pexels.com/photo/man-in-gray-dress-shirt-using-silver-ipad-29532/
[11] https://www.pexels.com/photo/conference-meeting-room-chairs-table-28756/
[12] https://www.pexels.com/photo/night-television-tv-video-8158/
[13] https://www.pexels.com/photo/gray-smartphone-37864/
[14] https://www.pexels.com/photo/man-in-black-and-white-polo-shirt-beside-writing-board-159844/
[15] https://www.pexels.com/photo/technology-computer-desktop-source-code-113850/
[16] http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/#crash-testing-side-view-after-impact1 (See ‘Content Sources’ for full citation)
[17] https://static.pexels.com/photos/79290/black-and-white-code-programming-tech-79290.jpeg
[18] https://www.pexels.com/photo/space-gray-iphone-6-showing-facebook-app-199497/
[19] https://www.pexels.com/photo/access-app-application-apps-267399/
[20] https://www.pexels.com/photo/people-community-party-beach-26135/
[21] http://www.careerbuilder.ca/blog/category/networking/ (See ‘Content Sources’ for full citation)
[22] https://www.pexels.com/photo/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/
[23] https://www.pexels.com/photo/iphone-checklist-hands-human-29765/
25. Content SourcesCited Informatic Sources
[1] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1665403896?accountid=6180
[2] Pew Research Center (2017, Jan 12). Mobile Fact Sheet. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/
[3] Murphy, K. (2010, Apr 07). First the camera, then the fork. New York Times (1923-Current File) Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1461109920?accountid=6180
[4] Canberra Centre (2015). FOOD PHOTOGRAPHY TIPS FOR INSTAGRAM. Retrieved from http://blog.canberracentre.com.au/food-dining/dining/instagram-food-
photography-tips/
[5] Matrix, Sidneyeve (2017, May 1). Module 2 Slides FILM 260 Digital Media Trends Summer. Retrieved from
https://onq.queensu.ca/d2l/le/content/117252/viewContent/936359/View
[6] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1665403896?accountid=6180
[7] Flickr (2017, May 28). Flickr Geotag Map. Retrieved from https://www.flickr.com/map
[8] Lipka, Mitch (2015, Jun 5). Percentage of companies that report systems hacked. CBS News Retrieved from http://www.cbsnews.com/news/percentage-of-
companies-that-report-systems-hacked/
[9] Smartphone. (n.d.). Retrieved June 1, 2017, from https://www.merriam-webster.com/dictionary/smartphone
[10] Home, hacked home; The internet of things. (2014, July 12). The Economist, 412(8895), 14(US). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA374524912&asid=3f62b19a238f2dbcba05701695a2d62f
[11] Brian Vance (2013, Mar 12). CRASH! A VOLVO XC60 TAKES THE IIHS’ SMALL OVERLAP TEST. Motor Trend Article Retrieved from
http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/
[12] Statista (2017). Number of monthly active Facebook users worldwide as of 1st quarter 2017 (in millions). Retrieved from
https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/
[13] How Facebook knows who all your friends are, even better than you do. (2015, April 2). Washingtonpost.com. Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299bf6c66dcb7543481dace
[14] Career Builder (2017, Apr 11). Creative ways to get noticed by employers on social media. Retrieved from http://www.careerbuilder.ca/blog/category/networking/