{"id":4163,"date":"2024-02-27T02:01:37","date_gmt":"2024-02-27T02:01:37","guid":{"rendered":"https:\/\/dataprivacyparty.com\/?post_type=podcast&#038;p=4163"},"modified":"2024-02-27T02:01:40","modified_gmt":"2024-02-27T02:01:40","slug":"privacy-tracking-surveillance","status":"publish","type":"podcast","link":"https:\/\/dataprivacyparty.com\/?podcast=privacy-tracking-surveillance","title":{"rendered":"Privacy Tracking &#038; Surveillance"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"723\" height=\"373\" src=\"https:\/\/i0.wp.com\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png?resize=723%2C373&#038;ssl=1\" alt=\"\" class=\"wp-image-1561\" srcset=\"https:\/\/i0.wp.com\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png?resize=1024%2C528&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png?resize=300%2C155&amp;ssl=1 300w, https:\/\/i0.wp.com\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png?resize=768%2C396&amp;ssl=1 768w, https:\/\/i0.wp.com\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png?w=1217&amp;ssl=1 1217w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/figure>\n\n\n\n<p class=\"\"><a href=\"https:\/\/youtu.be\/JWeXPWUcMw8\" title=\"YouTube\">YouTube<\/a> Video and <a href=\"https:\/\/podcasters.spotify.com\/pod\/show\/hunter-sundbeck\/episodes\/Privacy-Tracking--Surveillance-e2gamjm\" title=\"Spotify\">Spotify<\/a> Episode. Find us on Apple Podcasts!<\/p>\n\n\n\n<p class=\"\"><strong>Privacy Tracking &amp; Surveillance<\/strong>\u00a0<\/p>\n\n\n\n<p class=\"\">United Healthcare Cyber Attack<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">(Feb 21, based in Nashville) Change Healthcare \u2013 Platform providing analytics, data, data transfers between providers, payers, and consumers <a href=\"https:\/\/status.changehealthcare.com\/incidents\/hqpjz25fn3n7\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/status.changehealthcare.com\/incidents\/hqpjz25fn3n7<\/a>&nbsp;<\/li>\n\n\n\n<li class=\"\">Any pharmacies, including military pharmacies, couldn\u2019t provide prescriptions to customers&nbsp;<\/li>\n\n\n\n<li class=\"\">Systems were disconnected and taken offline to avoid further spread and isolate he issue.&nbsp;&nbsp;<\/li>\n\n\n\n<li class=\"\">Handles 67,000 pharmacies, 129 million customers, and 15 billion transactions annually&nbsp;<\/li>\n\n\n\n<li class=\"\">Too early to tell if patient data was exposed and what exactly happened, although my guess is that a third party with access to the platform was breached and the threat actor was able to obtain entry to the system&nbsp;<\/li>\n\n\n\n<li class=\"\">Suspecting a nation-state in the breach\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\"><strong>Chapter 6: Tracking &amp; Surveillance<\/strong><\/p>\n\n\n\n<p class=\"\">We will not be discussing the technical aspects of internet travel (protocols, packet headers, GET, etc.)\u00a0\u00a0<\/p>\n\n\n\n<p class=\"\">Internet Monitoring<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Packets traveling across the web &#8211;&gt; Packet sniffing, eavesdropping&nbsp;<\/li>\n\n\n\n<li class=\"\">Emails communications being intercepted&nbsp;<\/li>\n\n\n\n<li class=\"\">Employers tracking employee activity on company devices\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Web Tracking\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Wireshark, Kismet, Eavesdrop tools&nbsp;<\/li>\n\n\n\n<li class=\"\">Cookies&nbsp;<\/li>\n\n\n\n<li class=\"\">Set-cookie (small text file saved to the user\u2019s PC with values the site wants to store, expiration date, and domain path)\u00a0<\/li>\n\n\n\n<li class=\"\">Session cookie (stored only until the web browser is closed and only info about a particular page visit)&nbsp;<\/li>\n\n\n\n<li class=\"\">Persistent Cookies (can be saved indefinitely, unique user identifier, website preferences)\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Blocking and Controlling Web Traffic<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">US Children\u2019s Internet Protection Act (CIPA) requires schools and public libraries to block harmful and inappropriate content.&nbsp;<\/li>\n\n\n\n<li class=\"\">Helpful tips&nbsp;\n<ul class=\"wp-block-list\">\n<li class=\"\">Use HTTPS&nbsp;<\/li>\n\n\n\n<li class=\"\">Secure wireless networks&nbsp;<\/li>\n\n\n\n<li class=\"\">Use VPNs&nbsp;<\/li>\n\n\n\n<li class=\"\">Use TLS 1.2\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Location Tracking\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Often seeing the banner coming up that asks, \u201cwould you like to share your location with XYZ?\u201d Options are usually \u201cNever,\u201d&#8221; \u201cOnly while using app,\u201d or \u201calways.\u201d\u00a0<\/li>\n\n\n\n<li class=\"\">Safari and Firefox block 3<sup>rd<\/sup> party cookies&nbsp;<\/li>\n\n\n\n<li class=\"\">RFIDs used to track inventory and products&nbsp;<\/li>\n\n\n\n<li class=\"\">Location tracking should only be included if it provides a direct benefit to the user and is a primary component of the service\/product offered to the user. In other words, it should only be included in the offering if the service is unusable without it.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Audio and Video Surveillance<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">The Federal Wiretap Act allowed the FBI to legally tap the cell phones of known criminals. Malware was deployed to the phones to tab them.\u00a0<\/li>\n\n\n\n<li class=\"\">Pennsylvania School District in 2010 was taking photos of children\u2019s homes w\/o their knowledge or parental consent&nbsp;<\/li>\n\n\n\n<li class=\"\">42 users were affected in 14 months, settled for $600k\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Sensor-based Surveillance\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Smart homes and all the sensors&nbsp;<\/li>\n\n\n\n<li class=\"\">Vehicles and sensors included in them\u00a0<\/li>\n\n\n\n<li class=\"\">Pothole tracking application where drivers report potholes. In addition to reporting potholes, the drivers also give up their location since they need to report the potholes based on where they drove.\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Behavioral Monitoring<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Targeted Advertising&nbsp;<\/li>\n\n\n\n<li class=\"\">Building large data models based on your preferences to then target advertisements &#8211;> Those Instagram ads where you were talking about something, then suddenly you get an ad for it. Hearing your voice or just planning a few steps ahead of you?\u00a0<\/li>\n<\/ul>\n\n\n\n<p class=\"\">Concluding Thoughts<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\">Privacy Bill Next Up: New Hampshire (HB 314, SB 255)&nbsp;<\/li>\n\n\n\n<li class=\"\">Privacy Bill in the hole: Wisconsin (AB 466), Kentucky (HB 15)&nbsp;<\/li>\n\n\n\n<li class=\"\">NIST 800-66 Rev 2 to guide you to HIPAA compliance is available&nbsp;<\/li>\n\n\n\n<li class=\"\">COPPA 2.0 has fresh new sponsorships w\/ Maria Cantwell and Ted Cruz&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"is-style-default wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>YouTube Video and Spotify Episode. Find us on Apple Podcasts! Privacy Tracking &amp; Surveillance\u00a0 United Healthcare Cyber Attack Chapter 6: Tracking &amp; Surveillance We will not be discussing the technical aspects of internet travel (protocols, packet headers, GET, etc.)\u00a0\u00a0 Internet Monitoring Web Tracking\u00a0 Blocking and Controlling Web Traffic Location Tracking\u00a0 Audio and Video Surveillance Sensor-based [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1561,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"audio","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","jetpack_publicize_message":"Latest edition of the DPP Install is out now! #dataprivacyparty #dataprivacy","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"tags":[25,30],"series":[31],"class_list":["post-4163","podcast","type-podcast","status-publish","has-post-thumbnail","hentry","tag-opinion","tag-podcast","series-data-privacy-party-podcast"],"aioseo_notices":[],"episode_featured_image":"https:\/\/dataprivacyparty.com\/wp-content\/uploads\/2022\/06\/DPP-Installment-Logo.png","episode_player_image":"https:\/\/dataprivacyparty.com\/wp-content\/plugins\/seriously-simple-podcasting\/assets\/images\/no-album-art.png","download_link":"","player_link":"","audio_player":false,"episode_data":{"playerMode":"dark","subscribeUrls":{"apple_podcasts":{"key":"apple_podcasts","url":"","label":"Apple Podcasts","class":"apple_podcasts","icon":"apple-podcasts.png"},"stitcher":{"key":"stitcher","url":"","label":"Stitcher","class":"stitcher","icon":"stitcher.png"},"google_podcasts":{"key":"google_podcasts","url":"","label":"Google Podcasts","class":"google_podcasts","icon":"google-podcasts.png"},"spotify":{"key":"spotify","url":"","label":"Spotify","class":"spotify","icon":"spotify.png"}},"rssFeedUrl":"https:\/\/dataprivacyparty.com\/?feed=podcast&podcast_series=data-privacy-party-podcast","embedCode":"<blockquote class=\"wp-embedded-content\" data-secret=\"b4jjecPbdh\"><a href=\"https:\/\/dataprivacyparty.com\/?podcast=privacy-tracking-surveillance\">Privacy Tracking &#038; Surveillance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dataprivacyparty.com\/?podcast=privacy-tracking-surveillance&#038;embed=true#?secret=b4jjecPbdh\" width=\"500\" height=\"350\" title=\"&#8220;Privacy Tracking &#038; Surveillance&#8221; &#8212; DPP\" data-secret=\"b4jjecPbdh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/dataprivacyparty.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n"},"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=\/wp\/v2\/podcast\/4163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=\/wp\/v2\/types\/podcast"}],"author":[{"embeddable":true,"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=\/wp\/v2\/media\/1561"}],"wp:attachment":[{"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4163"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4163"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/dataprivacyparty.com\/index.php?rest_route=%2Fwp%2Fv2%2Fseries&post=4163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}