Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Data Brokering

Data brokers suck up anything and everything they can about you.
(Image used under: Creative Commons 4.0 [SRC])

At first you might not believe me when I say that your information is valuable. Where you eat, how much you spend for Christmas, your struggle with weight… all these things give companies an advantage in convincing you to give money to them andcompanies are only too happy to use every advantage against you so long as they make money.

Here's how that plays out:

Step 1: Get as much of your data as possible

While doing business with someone, they ask for information they don't actually need. Sometimes they do it to support planned future capabilities; sometimes for targeted marketing; and sometimes solely for the purpose of reselling the information to people who care more than they do. Regardless, your data is big business and it seems like everyone is poking and prodding you to give up as much data as possible even in grossly inappropriate ways.

I was once asked for my social security number at a video rental store before they'd rent videos to me!

The best way to do this of course is to create a site or service where you will choose to volunteer personal data about yourself for no particular reason. For example: Facebook. Facebook openly uses the information in your profile to target ads to you (sometimes in quite insulting ways):

With the knowledge that I was engaged to be married, the site splashed an ad across the left side of the screen playing into a presumed vulnerability. Do you want to be a fat bride? You'd better go to such-and-such Web site to learn how to lose weight before the big day.

Which brings us to step number 2…

Step 2: Use all the data to market to your interests (and also your weaknesses and insecurities).

It's just business.
(Image is in the Public Domain)

Ads that attack you on a personal level for profit aren't necessarily a mistake or just coincidence. Sometimes, it's the direct result of marketing designed to take advantage of you:

Facebook showed advertisers how it has the capacity to identify when teenagers feel “insecure”, “worthless” and “need a confidence boost”, according to a leaked documents based on research quietly conducted by the social network.

The internal report produced by Facebook executives, and obtained by the Australian, states that the company can monitor posts and photos in real time to determine when young people feel “stressed”, “defeated”, “overwhelmed”, “anxious”, “nervous”, “stupid”, “silly”, “useless” and a “failure”.

Facebook is notable in being very visible and public, but most brokering happens quietly and unseen… because most people would be horrified if they knew what was for sale:

Some extremely sensitive information can be sold very cheaply. World Privacy Forum Executive Director Pam Dixon’s testimony before the U.S. Senate included a screen cap showing that MEDbase 200 was selling lists of rape victims for 7.9 cents per name, as well as similarly-priced lists of those suffering from HIV/AIDs, genetic diseases, addictive behavior (conveniently broken down into sub-categories like gambling, sex, alcohol, and drugs) and dementia. The listings were taken down soon after Dixon’s testimony.

Loose controls and regulation of credit-based data brokering (in the form of credit reports) is the single biggest cause of ID Theft and now we're seeing companies profiting from victims, emotional weakness, and addicts. The scope and intensity of the consequences of rampant and uncontrolled data-brokering remain to be seen.

Data brokering (in the form of credit reports) is responsible for the vast majority of ID Theft. To learn more about how that happens and (more importantly) how to stop it, check out my Goodbye Identity Theft course.

Fixing the problem

If you don't keep my data on file, you can't lose it

We need strong regulation and stiff consequences as soon as possible, but until that happens, the only way to be safe is to fight data-brokering as much as you can by developing a mindset of privacy and Out and About Defense and keeping your information out of databases as much as you can. They can't lose, share, or abuse it if they don't have it!


Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]