IE 11 is not supported. For an optimal experience visit our site on another browser.

Can you use technology without risking your privacy?

By Christina DesMarais, Techlicious.comWho needs a paper map when smartphones today can find your exact location and give you turn-by turn-directions to your destination? And what’s the harm in shooting a quick photo that can be shared in seconds with friends, family and followers online? These modern marvels make life easier and more gratifying in many ways but their benefits don’t come witho
Ben Paton from Somerset, the first person to buy the new Apple iPhone 4 in Britain, poses with his phone inside the Apple store in central London in this June 24, 2010 file photo. Apple Inc's next-generation iPhone will have a faster processor and will begin shipping in September, three people with direct knowledge of the company's supply chain said. The production of the new iPhone will start in July/August and the smartphone will look largely similar to the iPhone 4, one of the people said on April 20, 2011. REUTERS/Paul Hackett/Files   (BRITAIN - Tags: BUSINESS SCI TECH)
Ben Paton from Somerset, the first person to buy the new Apple iPhone 4 in Britain, poses with his phone inside the Apple store in central London in this June 24, 2010 file photo. Apple Inc's next-generation iPhone will have a faster processor and will begin shipping in September, three people with direct knowledge of the company's supply chain said. The production of the new iPhone will start in July/August and the smartphone will look largely similar to the iPhone 4, one of the people said on April 20, 2011. REUTERS/Paul Hackett/Files (BRITAIN - Tags: BUSINESS SCI TECH)© Paul Hackett / Reuters / Today

By Christina DesMarais, Techlicious.com

Who needs a paper map when smartphones today can find your exact location and give you turn-by turn-directions to your destination? And what’s the harm in shooting a quick photo that can be shared in seconds with friends, family and followers online? These modern marvels make life easier and more gratifying in many ways but their benefits don’t come without a tradeoff. Never before has your privacy been more at risk.

Location Tracking

“I think perhaps the hottest issue right now is location. Location, location, location,” says Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation in San Francisco.

Indeed, both Microsoft and Google were recently under fire for collecting the locations of millions of laptops, cellphones and other Wi-Fi-enabled devices around the world. (Msnbc.com is a joint venture of Microsoft and NBCUniversal.)

The unique identifiers for those devices were then made public, meaning that if a person knew someone’s Media Access Control (MAC) address, he could infer where that person spent time with her phone in tow.

A MAC address is a device’s unique hardware number or physical address, and it allows a cellular carrier to find a phone and link it to its network.

While both Microsoft and Google have since made changes to their databases to assuage privacy concerns, the fact remains that our mobile phones can double as tracking devices.

“[Mobile phones] can reveal information about your location not only to your cellphone carrier but also to the cellphone manufacturer, the developer of the operating system of your phone or location-based service applications on your phone,” Bankston says. He adds that some apps have no use for your location, but simply want access to it for marketing purposes.

To keep those apps from tracking you, often it’s just a matter of making a few adjustments to your phone settings. On the iPhone, for example, you can turn off location features by going to Settings, General, Location Services. There you can enable or disable location functions for each app on your phone. Android handsets have a similar option in Settings, Location and Security.

But aside from shutting off your phone entirely, your cellphone carrier will always be able to triangulate tower signals to determine your location if law enforcement or some other entity should ask for it.

Geotags in photos

“Anytime you use an electronic device, depending on what the device is, you’re leaving a data trail, whether it’s GPS meta data in a photograph you take or [the] cookies you pick up when you’re online,” says Rainey Reitman, activism director with the Electronic Frontier Foundation.

She’s right. As we have pointed out, every time you take a photo with your cellphone, there’s a good chance your location is being stored along with the photo. Cellphones with GPS often default to storing this information when GPS is turned on. And some point-and-shoot and dSLR cameras also have GPS built into them.

There are a couple of ways to remove the location information from your photos, which is also called Exchangeable Image File Format (EXIF) data. First, you can download a simple program that strips out the EXIF data. For Windows PCs, try Easy Exif Delete (free on cnet.com) or iPhoto Exif Cleaner for Mac (free on cnet.com) for Macs. These programs will indiscriminately remove all of the EXIF data.

Cookies that can’t be deleted

And the cookies Reitman mentioned are the reason the ads you see online seem to know that you’re old enough to possibly want to buy wrinkle cream, or that you’re in the market for a new car.

In studying the companies and technology behind this targeted advertising, The Wall Street Journal found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors.

“There are third-party tracking cookies on almost every popular commercial site so they’re virtually impossible to avoid,” says Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse in San Diego, Calif.

While tech-savvy Web surfers used to simply delete these tracking cookies from their machines, the Wall Street Journal found that “…new tools…scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them.”

Understandably, some people think this kind of activity is wrong. Wired recently reported that website analytics firm KISSmetrics and more than 20 of its customers, including Spotify, AOL’s About.me, Etsy, Spokeo and the news site Gigaom.com were recently sued on the grounds that KISSmetrics’ tracking technology violated federal and state privacy laws.

All Web browsers provide ways to delete cookies from your computer. The website ghacks.net gives a good tutorial on doing it in each major browser. You can also visit the Network Advertising Initiative to opt out of the behavioral advertising conducted by its member companies.

Data mining

It might distress you to know how many websites display things like your address, phone number and other personal information.

“The problem is…if a consumer has a severe need to have privacy—if they’re a public defender or a law enforcement officer or the victim of stalking — it is practically impossible to truly keep your privacy online, especially your home address and such, because these information broker websites don’t have to remove your information,” says Reitman, who adds that some sites such as Spokeo, which at one time posted maps that pointed to people’s houses, now offer an opt-out option.

The Privacy Rights Clearinghouse provides an excellent listing of the scads of online information brokers that may be collecting information about you, as well as links to opt-out pages at those sites if they are available. Unlistmy.info also provides a list of the most popular sites that might be storing data about you, as well as advice for getting off those lists, if an option exists.

To see some of the many sites collecting information about you, try searching for your name at Pipl.com. I did and found all sorts of sites gathering my data. Pipl also offered maps to my house as well as a link to my wish list on Amazon, which also lists my birthday.

Online profiles

While many companies such as Amazon create public profiles for their customers, I find it unnerving that anyone can go snooping around my Amazon profile to find out what kinds of things I’d like to buy. I’ve been using Amazon since the company’s beginning and now can’t remember setting up a profile for myself. The point is that it’s important to check the privacy settings related to any kind of profile a site you use often may be keeping on you.

As another example, Health Month is an online game I occasionally like to play which involves setting health rules — such as “Eat fresh fruit every day” — and you win or lose points for following your own rules. After searching for “Christina DesMarais” and “profile,” I realized my Health Month profile — including all my healthy and unhealthy habits — was there for the world to see. I then spent several minutes trying without luck to find some privacy settings at the site that I could adjust. As my only recourse I was forced to change my name, birthday and email address on the site so as to not contribute to the data online brokers are able to glean about me.

I emailed Health Month and received a response within minutes. Buster Benson, who created Health Month (and is a person who’s very sharing with his personal data), said the way I handled it — by changing details on my profile — was the best method for staying hidden, but that he would be letting users adjust privacy settings within the next few weeks.

This goes to show that it often pays to raise your privacy concerns with a company.

Facial recognition

While Facebook is one of the companies the Electronic Frontier Foundation says has fought for user privacy in Congress, it also makes use of facial recognition software which is actually the opposite of private. Google and Apple also are using it in their respective Picasa and iPhoto products.

What makes facial recognition disturbing is how it could be used in the future as technology progresses. Already in Japan there are billboards that can recognize your gender, approximate age and ethnicity so as to better target ads toward you. And you may have heard that after the recent riots in London, police were using facial recognition to identify looters.

While identifying looters sounds like a good idea, think about what it would be like if everywhere you went cameras could determine who you were. Personally, I find the idea appalling. Remember the movie "Minority Report"?

And you might have reason to worry about those seemingly harmless Facebook photos that you’re tagged in.

Researchers from Carnegie Mellon University have found that it’s possible to use facial recognition technology to match the photos and real names from publicly available profiles (such as on Facebook) to profiles where the user used a pseudonym and wouldn’t want his real name used, such as Match.com.

In a published report the authors wrote, “Hence, face recognition creates the potential for your face in the street (or online) to be linked to your online identity(ies), as well as to the sensitive inferences that can be made about you after blending together offline and online data.”

The Los Angeles Times recently posted a guide for disabling Facebook’s facial recognition.

Devices with memory

If you’ve ever used a digital copy machine there’s a good chance the data you scanned is still saved to the copier’s memory. In fact, this poses such a privacy concern that several states are working on passing laws to require businesses to erase or encrypt stored data from digital copiers before recycling or disposing of them.

Any device with memory, including your PC or phone, should be cleared out before you part with it.

While some people think that deleting files and folders is sufficient before selling or disposing of a computer, they’re wrong. Deleted files can be undeleted. Even reformatting your hard drive can be undone. The most secure way to remove data from your computer is to use one of the wiping or erasing utilities we recommend when prepping your computer for disposal.

It’s also important to erase data from your phone before getting rid of it. With Apple's iOS, it’s a just a matter of hitting Settings, General, Reset, Erase All Content and Settings. For Android, you’ll want to format your microSD card, which you can do through SD Card and Phone Storage, under Settings. Then do a Factory Data Rest, under the Privacy menu in Settings.

The bottom line

There’s no doubt that as technology evolves privacy concerns grow. As a final example, let me share another tidbit. The Air Force is working on tiny spying aircraft that might be as small as a dragonfly. While they’re not sure how the little bugs might be used, the point is that technology is capable of finding more information about people than ever before thought possible.

More stories on Techlicious:

Check out Techlicious on Facebook and get the free daily Techlicious Newsletter.