Have you ever chatted with a friend about buying a certain item and been targeted with an ad for that same item the next day? If so, you may have wondered whether your smartphone was “listening” to you.
But is it really? Well, it’s no coincidence the item you’d been interested in was the same one you were targeted with.
But that doesn’t mean your device is actually listening to your conversations — it doesn’t need to. There’s a good chance you’re already giving it all the information it needs.
Can phones hear?
Most of us regularly disclose our information to a wide range of websites and apps. We do this when we grant them certain permissions, or allow “cookies” to track our online activities.
So-called “first-party cookies” allow websites to “remember” certain details about our interaction with the site. For instance, login cookies let you save your login details so you don’t have to re-enter them each time.
Third-party cookies, however, are created by domains that are external to the site you’re visiting. The third party will often be a marketing company in a partnership with the first-party website or app.
The latter will host the marketer’s ads and grant it access to data it collects from you (which you will have given it permission to do — perhaps by clicking on some innocuous looking popup).
As such, the advertiser can build a picture of your life: your routines, wants and needs. These companies constantly seek to gauge the popularity of their products and how this varies based on factors such as a customer’s age, gender, height, weight, job and hobbies.
By classifying and clustering this information, advertisers improve their recommendation algorithms, using something called recommender systems to target the right customers with the right ads.
Computers work behind the scenes
There are several machine-learning techniques in artificial intelligence (AI) that help systems filter and analyse your data, such as data clustering, classification, association and reinforcement learning (RL).
An RL agent can train itself based on feedback gained from user interactions, akin to how a young child will learn to repeat an action if it leads to a reward.
By viewing or pressing “like” on a social media post, you send a reward signal to an RL agent confirming you’re attracted to the post — or perhaps interested in the person who posted it. Either way, a message is sent to the RL agent about your personal interests and preferences.
If you start actively liking posts about “mindfulness” on a social platform, its system will learn to send you advertisements for companies that can offer related products and content.
Ad recommendations may be based on other data, too, including but not limited to:
- other ads you clicked on through the platform
- personal details you provided the platform (such as your age, email address, gender, location and which devices you access the platform on)
- information shared with the platform by other advertisers or marketing partners that already have you as a customer
- specific pages or groups you have joined or “liked” on the platform.
In fact, AI algorithms can help marketers take huge pools of data and use them to construct your entire social network, ranking people around you based on how much you “care about” (interact with) them.
They can then start to target you with ads based on not only your own data, but on data collected from your friends and family members using the same platforms as you.
For example, Facebook might be able to recommend you something your friend recently bought. It didn’t need to “listen” to a conversation between you and your friend to do this.
Exercising your right to privacy is a choice
While app providers are supposed to provide clear terms and conditions to users about how they collect, store and use data, nowadays it’s on users to be careful about which permissions they give to the apps and sites they use.
When in doubt, give permissions on an as-needed basis. It makes sense to give WhatsApp access to your camera and microphone, as it can’t provide some of its services without this. But not all apps and services will ask for only what is necessary.
Perhaps you don’t mind receiving targeted ads based on your data, and may find it appealing. Research has shown people with a more “utilitarian” (or practical) worldview actually prefer recommendations from AI to those from humans.
That said, it’s possible AI recommendations can constrain people’s choices and minimise serendipity in the long term. By presenting consumers with algorithmically curated choices of what to watch, read and stream, companies may be implicitly keeping our tastes and lifestyle within a narrower frame.
Don’t want to be predicted? Don’t be predictable
There are some simple tips you can follow to limit the amount of data you share online. First, you should review your phone’s app permissions regularly.
Also, think twice before an app or website asks you for certain permissions, or to allow cookies. Wherever possible, avoid using your social media accounts to connect or log in to other sites and services. In most cases there will be an option to sign up via email, which could even be a burner email.
Once you do start the sign-in process, remember you only have to share as much information as is needed. And if you’re sensitive about privacy, perhaps consider installing a virtual private network (VPN) on your device. This will mask your IP address and encrypt your online activities.
Try it yourself
If you still think your phone is listening to you, there’s a simple experiment you can try.
Go to your phone’s settings and restrict access to your microphone for all your apps. Pick a product you know you haven’t searched for in any of your devices and talk about it out loud at some length with another person.
Make sure you repeat this process a few times. If you still don’t get any targeted ads within the next few day, this suggests your phone isn’t really “listening” to you.
It has other ways of finding out what’s on your mind.
NSA spying row: Denmark accused of helping US spy on European officials
Published31 May
image copyrightReutersimage captionAngela Merkel was allegedly targeted by US intelligence
Denmark's secret service helped the US spy on European politicians including German Chancellor Angela Merkel from 2012 to 2014, Danish media say.
The Defence Intelligence Service (FE) collaborated with the US National Security Agency (NSA) to gather information, according to Danish public service broadcaster DR.
Intelligence was allegedly collected on other officials from Germany, France, Sweden and Norway.
Similar allegations emerged in 2013.
Then, secrets leaked by US whistleblower Edward Snowden alleged tapping of the German chancellor's phone by the NSA.
When those allegations were made, the White House gave no outright denial but said Mrs Merkel's phone was not being bugged at the time and would not be in future.
Germany is a close ally of the US.
German President Frank-Walter Steinmeier and a spokesperson for Angela Merkel have said they were not aware of Danish involvement until the DR report, which was shared with other European media over the weekend.
The NSA is said to have accessed text messages and the phone conversations of a number of prominent individuals by tapping into Danish internet cables in co-operation with the FE.
The alleged set-up, said in the report to have been codenamed "Operation Dunhammer", allowed the NSA to obtain data using the telephone numbers of politicians as search parameters, according to DR.
What reaction has there been?
DR interviewed nine sources, all of whom are said to have had access to classified information held by the FE.
Along with Mrs Merkel, then-German Foreign Minister Frank-Walter Steinmeier and the opposition leader at the time, Peer Steinbrück, are also said to have been targeted.
"Politically I view this as a scandal," Mr Steinbrück told German media.
Denmark's Defence Minister Trine Bramsen, who had reportedly been earlier informed of the espionage, told DR that "systematic wiretapping of close allies is unacceptable".
Other European politicians have condemned the reports.
Norwegian Prime Minister Erna Solberg told public broadcaster NRK: "It's unacceptable if countries which have close allied co-operation feel the need to spy on one another."
France's Europe Minister Clement Beaune told France Info radio the allegations were "extremely serious".
Neither the FE nor the NSA have yet commented on the latest reports.
Following the new report, Mr Snowden accused US President Joe Biden of being "deeply involved in this scandal the first time around". Mr Biden was US vice-president at the time the reported surveillance took place.
"There should be an explicit requirement for full public disclosure not only from Denmark, but their senior partner as well," he tweeted.
Who is Edward Snowden?
In 2013, Mr Snowden - a former contractor for the US Central Intelligence Agency (CIA) - leaked to the media details of extensive internet and phone surveillance by US intelligence.
The US then charged him with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence.
Prior to the evidence he exposed, top US intelligence officials had publicly insisted that the NSA had never knowingly collected data from private phone records.
What You Need To Know To Protect Your Data Online
Our personal information, data, and privacy online are more vulnerable than ever. Here's how to stay ... [+] safe online.getty
If you’re reading this column, I’d say it’s a pretty safe bet that you’re at least a casual news viewer. Which means I know you didn’t miss the recent deluge of pictures of Americans stockpiling gas.
Americans up and down the East Coast rushed to fill whatever they could find—gas cans, giant barrels, even plastic shopping bags—with gas out of fear that gas would soon become as hard to come by as TP and hand sanitizer in a Target in April 2020.
When this story first crossed my feed, my first thought was that this gas crisis must be related to foreign oil policy, and I was only slightly surprised to find out that this gas shortage was caused by a ransomware cyber attack that targeted the Colonial Pipeline.
Cybersecurity has been front of mind across many industries over the past few years, but has become especially relevant in the past year with the challenges of the pandemic and the rise of remote work. In fact, data shows that cyberattacks have risen 600% as a result of the pandemic!
These figures are certainly striking, but there is a temptation to think that it’s just big corporations that need to worry about their cybersecurity. Think again.
We are all vulnerable to cyberattacks. After all, our bank accounts may not resemble corporate holdings or a philanthropy’s endowment, but our financial information and data can still be very valuable. Even the most basic data such as birth dates, phone numbers, addresses and email addresses can be used to steal your identity.
With many of us continuing to work remotely, we will likely be spending a lot more time online these days. So how can we protect ourselves and our information from cybervulnerability? Here are some tips for making sure that your personal and professional data stay secure and protected.
Know your data security status
The first step to taking charge of your privacy and security online is to know whether or not any of your data has been compromised.
Start with searching your email or phone number on a data breach search engine. Have I Been Pwned? is a good place to start. Despite the silly name, this site isn’t just for gamers, and it can be a great starting point to find out how secure your data may or may not be.
Don’t be too alarmed if you find out your data has been compromised. When I first logged on and searched my email, I discovered that it had been included in five data breaches! And here’s the kicker, they all were for sites and services I haven’t used in years. It just goes to show how vulnerable we are, considering how often we have to submit our email addresses to utilize certain services online, and the fact that so many sites and apps have our information saved.
Have I Been Pwned? also has a feature that allows you to search your unique passwords and determine if they have been compromised in any data breaches.
A Pew Research study found that 64% of Americans had personally experienced their information being involved in a data breach, or been notified that their personal data had been compromised. With the increasing prevalence and sophistication of cyberattacks, we can only expect this number to increase.
Given everything we’ve discussed up to this point, I could understand why you might feel reluctant to put your number, email and especially your password into a search engine that quite honestly looks like it was made by a hacker, but you can put those fears to rest.
The website was created with the intention of spreading awareness about privacy online, and as such takes great care with your data and has very robust privacy policies. Your information is only searched against a database and never stored, and only the first five characters of your passwords would be utilized to cross check data breaches.
Be familiar with your privacy policies
This brings me to privacy policies. Yeah, you know those long blocks of text that you have to scroll through and “accept” before you can access that new app that turns your photo into a grandma or tells you what dog breed you should adopt?
Well, news flash, you should probably be reading those. I know, we’ve all become quite desensitized to the point of clicking through as fast as we can. A study found that only 9% of Americans make a point to read privacy policies.
But in order to make informed decisions about how we protect ourselves online, we really have to know how and why our data might be utilized. Remember that the five data breaches that my email address was implicated in were for sites and services I no longer utilized.
Let this be a lesson that every app we download so that we can keep up with the Joneses and post a hilarious selfie to the 'gram gets something out of the deal as well: our data. We should be mindful of how we share our information. Reading privacy policies may just remind you that many companies are using our data in ways that we might not willingly consent to, if we took the time to do our due diligence.
Consider a password manager
For a long time, I used a version of the same password for every account. And if that sounds like you, don’t worry, I’m not passing judgement... In fact, you’re definitely in the majority. A 2019 study found that two thirds of users have the same password for every account.
But, let’s be honest, most of us are probably tech-literate enough to know this is not a great idea. Another study found that 91% of internet users know that reusing a password is a bad idea, yet 61% do it anyway!
A password manager is a software program that creates unique, secure passwords for all of your accounts and stores them in one place, so you don’t have to keep track of many complicated passwords. Investing in a password manager is one of the best things you can do for your online security.
Using encryption, password managers can help keep your credentials locked down, so much so that they are considered to be 0% vulnerable to a “brute-force attack,” a common hacking tactic.
While there are free options for password managers, as is usually the case, you get what you pay for. Premium password managers are significantly safer than their free counterparts.
Here are some quick links to a few of the top password managers for 2021:
Know the hallmarks of a phishing scam
All your digital preparedness will only get you so far if you are unable to identify the red flags associated with potential online threats.
Phishing scams are the most common ways in which we can be targeted and have our digital privacy violated and our information stolen. The frequency of these cyberattacks has risen significantly, more than doubling from 2019 to 2020 with 214,324 reported attacks.
But what is phishing? Put simply, a phishing scam uses an email or a text message that is meant to seem as if it came from a legitimate party, such as a bank or phone company, with the goal of soliciting sensitive personal information.
Here’s what to look out for:
- The message claims to be from a business, however, uses a public email address. (Verizon will never send you a message from a @gmail account.)
- A message informing you that your account has been locked, or that you have to click a link in order to change security or account information
- Typos: correspondence from legitimate organizations will rarely have obvious misspellings or grammatical errors.
- Offers that are too good to be true. Remember what Grandma said, if it sounds too good to be true, it is.
- Messages meant to create a sense of urgency. If your bank tells you that you must “act quickly or your account will be permanently frozen,” or that you will “miss out on a one time offer” these should definitely be red flags.
- Any message that seems to have the explicit goal of getting your phone number.
Honestly, these scams can be pretty sophisticated, so it’s important to always have your guard up, and approach any correspondence with a healthy degree of skepticism.
Beware of public Wi-Fi
I know, but what about your favorite cafe? The baristas are so nice, it must be safe there, right?
Well, in truth, it’s best practice to try to avoid using public Wi-Fi if possible. Why? Public Wi-Fi makes it easy for hackers to access your information and devices.
So next time you have to send a quick email from your laptop, you might be better off creating a hotspot with your phone than linking up to whatever nearby Wi-Fi network isn’t password protected.
Forbes writer and cybersecurity expert Danny Pehar published some great advice on the pitfalls of public Wi-Fi. It’s a must-read to be up to date on protecting your sensitive date while working out in the world.
Here are awesome great takeaways:
- Be wary of public networks, even if they seem to be associated with legitimate businesses. Anyone can call their network “Starbucks Public Wifi #12”
- If you have to use public Wi-Fi, avoid logging onto any site or app that contains your sensitive information, such as banking or medical records
- Turn off Wi-Fi when you’re not using it. This way your phone won’t accidentally connect to a sketchy hacker Wi-Fi network.
- Use a VPN. A VPN is an excellent way to protect your privacy online, both at home and if you are using a public network. A Virtual Private Network will create just that, a private work connection that masks your IP address and cannot be traced. If this sounds a little bit “spy movie,” just trust me, it spells privacy for you and your data.
- Don’t share your phone number if you don’t have to
Lastly, you should treat online solicitations of your phone number like you would a creepy guy at the bar. Just don’t give it out.
Many scams are rooted in the simple attempt to get your phone number. It may seem innocuous, but your phone number can be used to access a ton of your personal information.
This is especially prevalent on online marketplaces such as Craigslist and OfferUp, where spammers will contact you with the express purpose of getting you to give up your phone number.
New York Times columnist Brian X. Chen consulted a cybersecurity researcher, who was able to use Chen’s phone number to access a ton of personal information.
Here are some of the information that your phone number could lead to:
- Home address, and past addresses
- Property ownership or history of property ownership
- Full names of family members
- Criminal records
So, it’s best practice whenever possible not to share your phone number online if you can avoid it.
With the many benefits of instantaneous connectivity come the inevitable pitfalls and trade-offs with our privacy and data security. But don’t resign yourself to the inevitability that your information is unprotected on the internet.
There are many steps you can take to keep your data and personal information safe and out of the hands of cybercriminals. It takes a little proactive maintenance, but trust me, the peace of mind of knowing that your information is secure is well worth the effort.