EREM Joaquim Távora For those concerned by reporting of
Facebook’s exploitation of user data to
Student: _____________________________ generate sensitive insights into its users, it is Grade: _____ | Teacher: Andréa Moraes worth taking note of WeChat, a Chinese super-app whose success has made it the envy of Western technology giants, including Invisible Manipulation: 10 ways our data is Facebook. WeChat has more than 900 million being used against us users. It serves as a portal for nearly every The era where we were in control of the data variety of connected activity in China. on our own computers has been replaced 6. Smart Cities and Our Brave New World with devices containing sensors we cannot control, storing data we cannot access, in Cities around the world are deploying operating systems we cannot monitor, in collecting increasing amounts of data and the environments where our rights are rendered public is not part of deciding if and how such meaningless. Soon the default will shift from systems are deployed. us interacting directly with our devices to 7. The Myth of Free Wi-Fi interacting with devices we have no control over and no knowledge that we are Many technologies, including those that are generating data. Below we outline 10 ways in critical to our day-to-day lives do not protect which this exploitation and manipulation is our privacy or security. One reason for this is already happening. that the standards which govern our modern internet infrastructure do not prioritise security which is imperative to protect privacy. 1. Fintech and the Financial Exploitation 8. Invisible Discrimination and Poverty of Customer Data Online, and increasingly offline, companies Financial services are collecting and gather data about us that determine what exploiting increasing amounts of data about advertisements we see; this, in turn, affects our behaviour, interests, networks, and the opportunities in our lives. The ads we see personalities to make financial judgements online, whether we are invited for a job about us, like our creditworthiness. interview, or whether we qualify for benefits is 2. Profiling and Elections — How Political decided by opaque systems that rely on Campaigns Know Our Deepest Secrets highly granular data. More often than not, such exploitation of data facilitates and Political campaigns around the world have exacerbates already existing inequalities in turned into sophisticated data operations. societies — without us knowing that it occurs. 3. Connected Cars and the Future of As a result, data exploitation Car Travel disproportionately affects the poorest and most vulnerable in society. As society heads toward an ever more connected world, the ability for individuals to 9. Data and Policing - Your Tweet Can and protect and manage the invisible data that Will Be Used Against You companies and third parties hold about them, Police and security services are increasingly becomes increasingly difficult. This is further outsourcing intelligence collection to third- complicated by events like data breaches, party companies which are assigning threat hacks, and covert information gathering scores and making predictions about who we techniques, which are hard, if not impossible, are. to consent to. 10. The Gig Economy and Exploitation 4. The Myth of Device Control and the Reality of Data Exploitation Gig economy jobs that depend on mobile applications allow workers’ movements to be Our connected devices carry and monitored, evaluated, and exploited by their communicate vast amounts of personal employers. information, both visible and invisible. 5. Super-Apps and the Exploitative Potential of Mobile Applications