Language Selection

English French German Italian Portuguese Spanish

Move over, Big Brother. Little Brother is squeezing in.

Filed under
Security

Robert Gortarez is no private eye.

But with an $80 piece of software intended to track what his son was doing on the Internet, the 36-year-old Phoenix real estate investor uncovered some information about what his wife - now his ex-wife - was doing online as well.

Gortarez isn't the only one. Husbands and wives, moms and dads, even neighbors and friends increasingly are succumbing to the temptation to snoop, thanks to a growing array of inexpensive, easily accessible high-tech sleuthing tools once available only to professional investigators.

Move over, Big Brother. Little Brother is squeezing in.

From software that secretly monitors computer activity to tiny hidden surveillance cameras and global positioning system devices, spy tools that can track a person's location now can be purchased in retail stores and on the Internet.

And a growing amount of free personal information is so easy to find online that many Internet regulars don't think of it as spying. Plug a name into Google and you have an instant background check of your best friend, your brother-in-law or that guy or gal you met last night at a bar.

"You can bug people the way spy agencies used to do 20 years ago - really cheap now," says Howard Rheingold, author of "Smart Mobs: The Next Social Revolution." "The Orwellian vision was about state-sponsored surveillance. Now it's not just the state, it's your nosy neighbor, your ex-spouse and people who want to spam you."

It's unclear how many Americans actually are using these new tools to check up on one another, especially since most people don't exactly broadcast it. But experts say citizen sleuthing is on the rise.

"My guess is it's very popular, just given how many people call me," says Deborah Pierce of Privacy Activism, a nonprofit advocacy organization based in San Francisco. Pierce is speaking this week at the 15th annual Computers, Freedom & Privacy Conference in Seattle.

Pierce says the fact that legal cases are starting to hit the courts "tells me it's prevalent."

Full Story

More in Tux Machines

today's leftovers

  • 6 Excellent Console Linux File Managers
    A console application is computer software which can be used with a text-only computer interface, the command line interface, or a text-based interface included within a graphical user interface operating system, such as a terminal emulator (such as GNOME Terminal or the aforementioned Terminator). Whereas a graphical user interface application generally involves using the mouse and keyboard (or touch control), with a console application the primary (and often only) input method is the keyboard. Many console applications are command line tools, but there is a wealth of software that has a text-based user interface making use of ncurses, a library which allow programmers to write text-based user interfaces.
  • PHP Tour 2016 Clermont-Ferrand
  • Enlightenment's EFL Getting New DRM Library
    Chris Michael of Samsung has been working on a new DRM library for the Enlightenment Foundation Libraries (EFL) with a number of improvements. The initial implementation of this new library, Ecore_Drm2, has been added to EFL Git.
  • Antergos 2016.05.28 Screenshot Tour
  • Gentoo Linux 20160514 Screenshot Tour
  • First coding week with openSUSE, Google Summer of Code
    Embedded below is the blog of Google Summer of Code student Martin Garcia Monterde. Martin detailed his first week coding with openSUSE and the Google Summer of Code.
  • OpenPHT 1.5.2 for Debian/sid
    I have updated the openpht repository with builds of OpenPHT 1.5.2 for Debian/sid for both amd64 and i386 architecture. For those who have forgotten it, OpenPHT is the open source fork of Plex Home Theater that is used on RasPlex, see my last post concerning OpenPHT for details.
  • vcswatch is now looking for tags
    About a week ago, I extended vcswatch to also look at tags in git repositories. Previously, it was solely paying attention to the version number in the top paragraph in debian/changelog, and would alert if that version didn't match the package version in Debian unstable or experimental. The idea is that "UNRELEASED" versions will keep nagging the maintainer (via DDPO) not to forget that some day this package needs an upload. This works for git, svn, bzr, hg, cvs, mtn, and darcs repositories (in decreasing order of actual usage numbers in Debian. I had actually tried to add arch support as well, but that VCS is so weird that it wasn't worth the trouble).

Google and Oracle

Leftovers: OSS

Security Leftovers (Parrot Security OS 3.0 “Lithium”, Regulation)

  • Parrot Security OS 3.0 “Lithium” — Best Kali Linux Alternative Coming With New Features
    The Release Candidate of Parrot Security OS 3.0 ‘Lithium’ is now available for download. The much-anticipated final release will come in six different editions with the addition of Libre, LXDE, and Studio editions. The version 3.0 of this Kali Linux alternative is based on Debian Jessie and powered by custom hardened Linux 4.5 kernel.
  • Regulation can fix security, except you can't regulate security
    Every time I start a discussion about how we can solve some of our security problems it seems like the topics of professional organizations and regulation are where things end up. I think regulations and professional organizations can fix a lot of problems in an industry, I'm not sure they work for security. First let's talk about why regulation usually works, then, why it won't work for security.