Internet Librarian International
But I’m doing nothing wrong!
• Does that mean you let people peer in at your
• Does it mean that you want to be bombarded
• Does it mean that you’re happy constantly
• Does it mean that you’re happy with other
people making money out of you?
(c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
Which is more important to you?
Ease of access to data
Keeping up with friends
A few facts
• 21% of internet users have had an email or
social networking account compromised
• 12% have been stalked/harassed online
• 11% have had important data stolen
• 6% have had their reputation damaged
• 4% have been led into physical danger
because of something that happened online
Headline bad news
• The US Postal Service is involved with the Mail
Isolation Control and Tracking program
– 160 billion pieces of mail are photographed annually
• GCHQ handled 600m ‘telephone events’ each day
in 2012, had tapped more than 200 fibre optic
cables and could process data from 46 at a time
• The National Security Agency can reach 75% of all
US Internet traffic
• Commercial software exists which can spy on
mobile phones (Flexispy)
• Mobile phone pictures can be used to track
• The microphone and webcam on your
computer can be remote activated
• “America has no functioning democracy”
Jimmy Carter, July 2013
• Gmail users have no "reasonable expectation"
that their communications are confidential
• Microsoft has admitted that anything stored
in its cloud services, eg Outlook or Office 365
can be accessed by the US Govt under the
Patriot Act of 2001 or the Foreign Intelligence
Surveillance Act of 1978
And a little more
• The UK’s National Physical Laboratory has
developed a walking gait recognition system
that can be used to help track a person
through a CCTV-monitored area by analysing
the way that they walk.
And a tiny bit more
• 145 of the top 10,000 websites track users
without their knowledge or consent
– ‘Digital fingerprinting’ circumvents legal
restrictions imposed on cookies
– Flash based fingerprinting can uniquely identify
specific machines based on computer properties
such as screen size, fonts, plugins and installed
» Katholieke Universiteit Leuven Newsroom
Recycling bins can track your phone
• Always sign out of Facebook
– Closing the tab doesn’t sign you out
• View your timeline as it appears to ‘nonfriends’
– Click the cog wheel
– Timeline and tagging settings
– Who can see things on my timeline?
– View as
Check your privacy settings
• Who can see my stuff?
– Future posts
– Review all your posts
– Limit the audience for posts you’ve shared
• Who can contact me?
– Who can send you friend requests?
– Whose messages do I want filtered?
• Who can look me up?
– Using the email address or phone number
– Do you want other search engines to link to your
Deleting a Facebook account
Deleting an account
• This can take up to one month
• Some data may be retained for 3 months
• Some content will always remain
• Download a copy of your Facebook
Facebook shadow profiles
• A friend looks for you, or installs an app on
– Facebook now has your phone number and email
• Seen the ‘people you might know?’ A 3rd party
uses the ‘Find friends’ option, has your details
(new or old) and can link old addresses
Can you stop this?
• Not really
• Theoretically illegal in Europe
• Tell all your friends never to refer to you on
Facebook, don’t install Facebook apps, don’t
put your details into their smartphone....
Plugging the leak!
• Disguise your IP address with a Virtual Private
Network (VPN) tool
– Spotflux http://www.spotflux.com
– Hotspot Shield http://www.hotspotshield.com
• Remove details from 192
– ‘Removal of personal details’
• Go ex-directory with BT
• Add WHOIS privacy via your domain registrar
‘The Onion Router’
• Software you can install to hide your identity
while you browse
• Originally developed for the US Navy
• Your communications take a random pathway
through several relays to cover your tracks,
and these are encrypted
Who uses it?
• Family and friends
– To protect themselves, children and dignity
– To research competition, keep business strategies
– To report abuses or corruption
– To protect their research and sources
Where you go
• You can be tracked by cookies, the ‘Like’
button and Google +1
– Regardless of whether you click on the buttons or
• Your browser also tracks you
• Location services in Facebook and Twitter can
Plugging the leak!
‘Do not track’
• Browser option ‘Do not track’
– Not entirely effective
• Disconnect http://www.disconnect.me
– Prevents sites inc. Facebook, Google, Twitter and
Yahoo from tracking your activities
• When you search and click on a link your
search term is usually sent to that site, along
with browser and computer information.
• Those sites may have third party adverts
which build profiles about you, and those
adverts can then follow you around.
• Your profile can then be sold on.
• Google stores your searches
• Which can then be legally requested
Plugging the leak!
Search engines that don’t store data
Search engines that don’t track
And some more
Oh, and a couple more
http V https
• Without ‘https’ your traffic is unencrypted
• This leaves you open to government
monitoring and persistent 3rd party cookies
Hints and tips
• Do not accept search engine cookies
• Do not use email options with a search engine
• Use a variety of different search engines
• Avoid using terms with your name attached
Removing yourself from results
• Ask the webpage owner/author
• Ask Google to remove the cached version
• Ask Google to remove content on Blogger, G+
• Bury bad content with BrandYourself