Thursday 6 September 2012

How to reduce your digital footprints?

In this essay the writer will convey countermeasures that can be used to evade or reduce an individual's digital footprint. 
A digital foot print can be defined as: "The record of your interactions with the digital world and how the data that is left behind can be exploited." (Fish, 2010)
As individual's use certain resources such as cell phones or GPS devices, they leave behind information which is considered to be a part of their digital footprint.  For example:  an individual sends a text message. 
This message is routed through the service provider and stored on the service providers system.  This simple transaction of sending a text message is considered a part of that individual's digital foot print.
Cell Phones
Cell phones are tied to an individual's through their primary or secondary accounts.  The phone number is directly linked to the individual and can be used to find them via their cell phone number. 
A person can use such site as Zabasearch to do a reverse phone look up.  This process data mines for the user's information, and gives such things as name and address.  By using this tool an individual can be tracked to their relative location.  However, a reverse phone look up is only as relevant as the last time a user updated their information with their service provider. 
Many new phones also have global positioning software installed on their device which is typically set to "on" by default.  The benefit to this is that local authorities and first responders can track an individual if they were to become missing, or in an accident for which they cannot respond themselves. 
Cell Phone Countermeasures
There are two ways in which a person can evade the cell phone footprint.  Like all evasion methods it is up to the individual to determine how far they will go in order to evade detection. 
The first method would simply be to shut the phone off and not use it.  However, this can become cumbersome and only hides surface levels of detection.  Individual's looking to track the cell phone user can still do reverse phone look-ups to get a rough estimate of their location. 
The second method would be to purchase pre-paid phone service under another individual's name. In this method and individual no longer registers their information with a service provider, and their number is now completely new to any identity. 
Another benefit to using prepaid phone services is that a new subscription and number can be obtained as soon as the initial plan runs out.  Therefore the number itself is constantly changing making it harder to determine the user's number through search.
Global Positioning Systems
A Global Positioning System is a device that uses satellite technology to determine their exact, or relatively close to exact geographical location.  GPS information can be mined by other companies. 
For example:  many new cell phones have GPS software installed and set to "on" as a default.  Individual's can use free internet tools to find these devices in real time.  There are several sets of software available to install in an individual's cell phone for GPS tracking, but this is also the down side to cell phone tracking.
Global Positioning System Countermeasures
One of the easiest ways to evade GPS tracking is by disabling or shutting down the device.  If the device is not broadcasting for satellites is does not have the information it relies on to determine its geographical location.  An individual can also purchase GPS jamming equipment. This equipment broadcasts a signal that disrupts a GPS devices ability to send and receive signals from satellites. 
However, these devices may incur undo attention as they may block out other such services like aircraft navigational equipment.  An example of a GPS jamming device can be found at this website: http://www.chinavasion.com/product_info.php?products_id=3248. ("Chinavasion," )
Internet Information
It is very difficult for individuals to evade this level of a digital footprint.  Many individuals currently use such things as debit and credit cards for most, if not all of their transactions.  In this case the woman who is being tracked by her ex-husband has legal documentation that can be used to petition such organizations to have her information blocked. 
However, social networking sites are also problematic as they store all information uploaded to the site even after the site has been deleted.
Internet Information Countermeasures
The best way to reduce an individual's signature with regards to Internet Information would be to not use such venues.  This would be very difficult indeed.  It would require an individual to use cash for all purchases, and to refrain from using such things as social networking sites. 
A second method would be to petition any and all sites that the user finds holding information about the user, and petitioning each individual site to block or delete this information.  Although both countermeasures are time consuming and tedious, they are also very effective in reducing an individual's digital footprint.
Government Sale of Information
Government agencies are now looking to profit from individual's information as well.  Local agencies are charging data wholesaler's fees for information not protected under the Freedom of Information Act (U.S. Department of, 1966). 
The obvious benefit is on the side of the agency in increased revenue.  However, this also means that individual's information can be purchased there as well. 
Government Sale of Information Countermeasures
The most effective way to evade or reduce an individual's signature with regards to government sale of information would be to legally change an individual's identity.  Effectually the old identity dies off and all matters regarding an individual would be forwarded to the new identity.  Many times a change in identity requires an individual to declare publicly the name change. 
However, in our subject's situation a stay of publicity could be called for and granted by a judge.  Granting a stay of public announcement would therefore allow the individual to begin under a new identity.  An individual's Social Security Number (SSN) could be handled in the same fashion.
Conclusion
In conclusion it is the writer's opinion that it is the level of determination that takes precedence over method of evasion.  Many individuals might not have the discipline necessary to convert to a new life that is constantly on the move, and devoid of real emotional connection with others. 
The more an individual reduces their signature the more recluse they become.  It is the writer's opinion that in the subject matter of the woman in question that the following techniques be used:
  • Revolving prepaid cell phone use under alternate identities.
  • Discontinue of text messaging to friends and family unless in the case of emergency.
  • Discontinue or use under abstract pseudonym social networking websites.
  • Change of legal name and Social Security Number.
  • Prepaid debit and credit card use under friends or family members.
  • Cash transactions when possible.
  • No direct deposit use from employer.
  • Forwarding of mail to various locations such as PO Boxes and friends / family members.
  • Change of location habits such as local bars and restaurant.
  • Petition to block or delete information found on information wholesaler systems or websites.
The above techniques in the woman's circumstance should reduce her digital footprint to a point whereby only a determined and skilled individual has chance of locating the subject.  It is the writer's opinion that the woman also reduces the amount of new friends and contacts until she sufficiently feels far enough away from her pursuer.
References
Fish, T. (2010, June 28). Definition of a digital footprint (again) [Web log message]. Retrieved from http://blog.mydigitalfootprint.com/definition-of-digital-footprint-again
Karn, P. (n.d.). Cell phone tracking. Retrieved from http://www.ka9q.net/papers/tracking.html
Zabasearch. (n.d.). Retrieved from http://www.zabasearch.com/
Chinavasion. (n.d.). Retrieved from http://www.chinavasion.com/product_info.php?products_id=3248
U.S. Department of Justice, Office of Information Policy. (1966). Freedom of information act Washington D.C.: Retrieved from http://www.justice.gov/oip/

Credits :  http://www.infosecisland.com/blogview/16125-Reducing-Your-Digital-Footprint.html 
Print Page

No comments:

Post a Comment