| Fri Aug. 13, 2010 3:00 AM PDT
The state of the art is growing increasingly intrusive, the Journal found. Some tracking files can record a person's keystrokes online and then transmit the text to a data-gathering company that analyzes it for content, tone and clues to a person's social connections. Other tracking files can re-spawn trackers that a person may have deleted.A full list of the sites they examined is here. The most intrusive were dictionary.com and msn.com, which installed over 200 tracking files each. The least intrusive were craigslist.org and wikipedia.org.
....Some of the tracking files identified by the Journal were so detailed that they verged on being anonymous in name only. They enabled data-gathering companies to build personal profiles that could include age, gender, race, zip code, income, marital status and health concerns, along with recent purchases and favorite TV shows and movies.
What to do about this? Europe, which generally has better rules than the U.S. regarding the collection and use of personal data, actually has tighter regulations about how long online data should be stored. After all, the local police might want to use it someday. The Christian Science Monitor reports that this is finally provoking a reaction:
Across Europe, a backlash against the storage of private data is growing. Civil society groups like the European Federation of Journalists have criticized the practice, and in Germany almost 35,000 people, including Justice Minister Sabine Leutheusser-Schnarrenberger, sued their own government over the issue.This tension means that governments aren't always eager to restrict the collection of personal data online. Beyond that, though, there are technical difficulties for those who want to prohibit the practice. When Congress passed the Do Not Call law in 2003, their job was easy: everyone has a telephone number, and all you have to do is put those numbers into a database and tell solicitors not to call them. But there's no equivalent of a phone number in the digital world. Your computer's ID is its IP address, but most IP addresses change regularly. There's no way of creating a "Do Not Track" database and telling online solicitors to keep their tracking files away from everyone who signs up.
"There is a real problem in Europe today. It is a breach of the European Convention on Human Rights, which says that everyone has the right to a private life. That fundamental right has to extend into digital life," says Christian Engström, a member of the European Parliament for Sweden's controversial Pirate Party, elected on a platform of digital rights.
Alternatively, as Harlan Yu wrote recently, we could adopt the opposite approach: instead of asking users to register, we could require solicitors to register and then rely on browser settings that would prevent their domains from installing tracking files. Unfortunately, this has technical drawbacks as well, so Yu suggests instead a new standard that would allow your browser to notify every site you visit that you don't wish to be tracked:
The browser could enable x-notrack for every HTTP connection, or for connections to only third party sites, or for connections to some set of user-specified sites. Upon receiving the signal not to track, the site would be prevented, by FTC regulation, from setting any persistent identifiers on the user’s machine or using any other side-channel mechanism to uniquely identify the browser and track the interaction.This would, of course, require legislation that requires online sites to honor the x-notrack request. That's the bad news. The good news is that whatever the eventual solution, the problem itself is finally getting some attention on Capitol Hill: Politico reported last week that Sen. Mark Pryor (D–AR) is writing a bill "aiming to give consumers more control over their online data....The focus of the bill, which is still in rough draft form, will be giving consumers the ability to opt out of being tracked across the Web." So stay tuned.
In the meantime, the Journal's full package of privacy articles is here, and they're well worth browsing through. It includes pieces that explain web tracking, cell phone monitoring, how much these tracking services know about you, the role of big companies like Google and Microsoft, and even advice on how to avoid tracking. You can't avoid it all, but there are things you can do to minimize it.
What They Know
The Wall Street Journal's What They Know series documents the new, cutting-edge uses of this Internet-tracking technology.
Marketers are spying on Internet users -- observing and remembering people's clicks, and building and selling detailed dossiers of their activities and interests. The Wall Street Journal's What They Know series documents the new, cutting-edge uses of this Internet-tracking technology. The Journal analyzed the tracking files installed on people's computers by the 50 most popular U.S. websites, plus WSJ.com. The Journal also built an "exposure index" -- to determine the degree to which each site exposes visitors to monitoring -- by studying the tracking technologies they install and the privacy policies that guide their use.
Loading...
| ||
dictionary.com
|
234
| |
merriam-webster.com
|
131
| |
comcast.net
|
151
| |
careerbuilder.com
|
118
| |
photobucket.com
|
127
| |
msn.com
|
207
| |
answers.com
|
120
| |
yp.com
|
89
| |
msnbc.com
|
117
| |
yahoo.com
|
106
| |
aol.com
|
133
| |
wiki.answers.com
|
72
| |
cnn.com
|
72
| |
about.com
|
83
| |
cnet.com
|
81
| |
verizonwireless.com
|
90
| |
imdb.com
|
55
| |
live.com
|
115
| |
att.com
|
58
| |
walmart.com
|
66
| |
bbc.co.uk
|
45
| |
ebay.com
|
42
| |
ehow.com
|
55
| |
amazon.com
|
38
| |
espn.com
|
61
| |
myspace.com
|
108
| |
wsj.com
|
60
| |
go.com
|
68
| |
chase.com
|
31
| |
ask.com
|
44
| |
weather.com
|
36
| |
flickr.com
|
34
| |
wordpress.com
|
25
| |
target.com
|
32
| |
paypal.com
|
23
| |
linkedin.com
|
20
| |
mapquest.com
|
38
| |
mozilla.com
|
21
| |
bing.com
|
59
| |
twitter.com
|
17
| |
bankofamerica.com
|
11
| |
apple.com
|
14
| |
adobe.com
|
30
| |
microsoft.com
|
41
| |
facebook.com
|
4
| |
blogger.com
|
8
| |
google.com
|
26
| |
mywebsearch.com
|
6
| |
youtube.com
|
14
| |
craigslist.org
|
4
| |
wikipedia.org
|
0
|
Is a site you are interested in not here?
Enter a URL and get more info about its privacy policies:
Powered by
Disclaimer » Download TrackerScan
Install a Firefox Web browser tool to see real-time analysis of the tracking companies that are collecting information on Web pages you visit.
-
Google Agonizes on Privacy as Rivals Emerge
A confidential, Google "vision statement" shows the company in a deep round of soul-searching over a basic question: How far should it go in profiting from its crown jewels—the vast trove of data it possesses about people's activities? Fifth in a series.
-
The Web's New Gold Mine: Your Secrets
A Wall Street Journal investigation finds that one of the fastest growing businesses on the Internet is the business of spying on American consumers. First in a series. -
Personal Details Exposed Via Biggest U.S. Websites
The largest U.S. websites are installing new and intrusive consumer-tracking technologies on the computers of people visiting their sites—in some cases, more than 100 tracking tools at a time—a Wall Street Journal investigation has found.
-
Microsoft Quashed Bid to Boost Web Privacy
After sharp internal debate, Microsoft designed Internet Explorer so that users must turn on privacy settings every time IE starts. Second in a series.
-
On Web's Cutting Edge, Anonymity in Name Only
Websites are gaining the ability to decide whether or not you'd be a good customer, before you tell them a single thing about yourself. Third in a series.
-
Stalking by Cellphone
GPS tracking technology used by many phone companies has unexpectedly made it easier for spousal abusers to track their victims. Fourth in a series.
-
More on the Study
-
The Journal's Methodology
To determine the prevalence of Internet tracking technologies, The Wall Street Journal analyzed the 50 most visited U.S. websites. Here's how we did the study. -
The Tracking Ecosystem
Surfing the Web kickstarts a process that passes information about you and your interests to tracking companies and advertisers. See how it works. -
What They Know: A Glossary
Key tracking terminology
-
Explore the Data
The Journal analyzed the tracking files installed on people's computers by the 50 most popular U.S. websites, plus WSJ.com. See what the study found. -
Video: A Guide to Cookies
It's rarely a coincidence when you see Web ads for products that match your interests. The Journal explains how advertisers use cookies to track your online habits. -
One Smart Cookie
New York ad company [x+1] made predictions about users based on just one click on a website. Read more about the users and the companies' assumptions. -
Google: Into the Future
A confidential internal document from 2008 outlines ways Google could try to profit from its vast databases of personal information. See excerpts from the document. -
Google's Widening Reach
Google, a company with vast pools of data about its users, is moving into the world of highly targeted ads. See how Google has changed its collection and use of data.
The Great Privacy Debate
-
Why Tracking Isn't Bad
It's modern commerce: Web users get back as much as they give, says Jim Harper. -
The Dangers of Web Tracking
As companies strive to personalize services, the surreptitious collection of personal information is rampant. The very idea of privacy is under threat, says Nicholas Carr.
More From Digits
- Online Advertisers Defend Industry Amid Web-Privacy DebateOnline-advertising advocates -- citing a “War Against the Web” -- are gearing up to defend their industry as the debate about Web privacy intensifies.
- Lawmakers Seek Answers on Online TrackingLawmakers are seeking information about the privacy practice of the 15 websites that the Wall Street Journal identified as installing the most tracking technology on their visitors' computers.
- Digits Live Show: Avoiding Prying Eyes OnlineThe WSJ's Jennifer Valentino-DeVries discusses the types of tracking technologies encountered on sites across the Web, and gives some guidance about how to manage your exposure online.
- The Information That Is Needed to Identify You: 33 BitsMany data collectors assure consumers that they don't collect or store personally identifiable information. But researchers say it's often possible to identify people even without that information.
- So Many Trackers, So Little Time
- The Mystery of Internet Explorer's Privacy Settings
- **********************************************
Covert National Mass Surveillance Grid Exposed
Battlefield Technologies Migrate HomeNever has it been more urgent for people around the country to take action to end the government’s mass surveillance against the people.Most people are not aware that silently, but constantly, the government is now watching, recording your everyday travels and storing years of your activities in massive data warehouses that can be quickly “mined” to find out when and where you have been, whom you’ve visited, meetings you’ve attended, and activities you’ve taken part in. This is all done by using an elaborate network of Automatic License Plate Recognition cameras, also known as tag readers.The Partnership for Civil Justice Fund has spent years investigating and uncovering this mass surveillance grid that is being put in place in the United States in the absence of public awareness, scrutiny, debate or oversight.It’s a system of mass surveillance and data warehousing on law-abiding persons and citizens. You’re being tracked routinely, without probable cause, without a warrant and without even a suspicion that you have committed a crime.The public has a right to know about this program and to stop it. The PCJF has established a national campaign, One Nation Under Surveillance, with a proactive website providing the tools and information you can use to take action now.ALPR is a technology of social control. And it’s not just critics who call it so. The International Association of Chiefs of Police, which itself favors tag readers, acknowledged in a report “The potential privacy harm of surveillance is its potential use as a tool of social control.”At our campaign site, www.BigBrotherAmerica.org, you can:- Send a letter to representatives in Congress demanding public hearings to expose this widespread but covert mass surveillance. It will only take a minute. A sample letter is included feel free to add your own message. click here
- View and contribute to the growing national map of tag reader locations around the country.
- Send in your photos and location information for tag readers in your town or city.
- Download posters for the One Nation Under Surveillance Campaign, these graphics are striking and powerful. You can contribute your own graphics for the campaign, too.
Background on Tag Readers;
Battlefield and Occupation Technologies Migrate Home:Originally developed by the United Kingdom to be used against the Irish Republican Army, later deployed by the U.S. in Baghdad, tag readers have now been adapted for routine and massive deployment against civilians in the U.S.Tag readers are physical cameras that can be stationary, mounted on traffic poles, gates or bridges, hidden in white and orange traffic barrels, or disguised in roof-mounted taxi-signs. A tag reader captures thousands of license plates per minute, day or night and records the date, time, photo of the vehicle and possibly occupants, its immediate area and GPS coordinates.The federal government has spent millions of dollars outfitting local law enforcement, from big cities, to the smallest towns with tag reader systems. Using the pretext of drug interdiction and border enforcement, the federal government has installed its own network of cameras that has grown and continues to grow well past the borders throughout the U.S. The Department of Homeland Security has created customized software to integrate the surveillance data obtained through all the different vendor systems that are on the market and used by different localities. The federal government has a massive datastorage center for tag reader information located in Northern Virginia.Read more about tag readers in PCJF’s first article in a new series.With a plate and a cross-reference to other databases (like the Department of Motor Vehicles, credit card companies and phone records) a full profile about you can easily be created through electronic and computer data. The fusion of license plate reader data with commercial databases and intelligence databases gives the government virtually unlimited knowledge of our activities and associations.Working together we can halt this operation. With exposure and concerted public opposition, this program can be stopped.Become a part of PCJF’s campaign to end illegal government surveillance -- take action today.
SPREAD THE WORD
Forward this Email
Subscribe for Updates