You are on page 1of 1

EREM Joaquim Távora For those concerned by reporting of

Facebook’s exploitation of user data to


Student: _____________________________
generate sensitive insights into its users, it is
Grade: _____ | Teacher: Andréa Moraes worth taking note of WeChat, a Chinese
super-app whose success has made it the
envy of Western technology giants, including
Invisible Manipulation: 10 ways our data is Facebook. WeChat has more than 900 million
being used against us users. It serves as a portal for nearly every
The era where we were in control of the data variety of connected activity in China.
on our own computers has been replaced 6. Smart Cities and Our Brave New World
with devices containing sensors we cannot
control, storing data we cannot access, in Cities around the world are deploying
operating systems we cannot monitor, in collecting increasing amounts of data and the
environments where our rights are rendered public is not part of deciding if and how such
meaningless. Soon the default will shift from systems are deployed.
us interacting directly with our devices to 7. The Myth of Free Wi-Fi
interacting with devices we have no control
over and no knowledge that we are Many technologies, including those that are
generating data. Below we outline 10 ways in critical to our day-to-day lives do not protect
which this exploitation and manipulation is our privacy or security. One reason for this is
already happening. that the standards which govern our modern
internet infrastructure do not prioritise security
which is imperative to protect privacy.
1. Fintech and the Financial Exploitation 8. Invisible Discrimination and Poverty
of Customer Data
Online, and increasingly offline, companies
Financial services are collecting and gather data about us that determine what
exploiting increasing amounts of data about advertisements we see; this, in turn, affects
our behaviour, interests, networks, and the opportunities in our lives. The ads we see
personalities to make financial judgements online, whether we are invited for a job
about us, like our creditworthiness. interview, or whether we qualify for benefits is
2. Profiling and Elections — How Political decided by opaque systems that rely on
Campaigns Know Our Deepest Secrets highly granular data. More often than not,
such exploitation of data facilitates and
Political campaigns around the world have exacerbates already existing inequalities in
turned into sophisticated data operations. societies — without us knowing that it occurs.
3. Connected Cars and the Future of As a result, data exploitation
Car Travel disproportionately affects the poorest and
most vulnerable in society.
As society heads toward an ever more
connected world, the ability for individuals to 9. Data and Policing - Your Tweet Can and
protect and manage the invisible data that Will Be Used Against You
companies and third parties hold about them,
Police and security services are increasingly
becomes increasingly difficult. This is further outsourcing intelligence collection to third-
complicated by events like data breaches, party companies which are assigning threat
hacks, and covert information gathering scores and making predictions about who we
techniques, which are hard, if not impossible, are.
to consent to.
10. The Gig Economy and Exploitation
4. The Myth of Device Control and the
Reality of Data Exploitation Gig economy jobs that depend on mobile
applications allow workers’ movements to be
Our connected devices carry and monitored, evaluated, and exploited by their
communicate vast amounts of personal employers.
information, both visible and invisible.
5. Super-Apps and the Exploitative
Potential of Mobile Applications

You might also like