Premium Essay

Law Paper 2

In:

Submitted By
Words 1043
Pages 5
Our personal information is always at risk and goes through unimaginable ways of getting it. No matter what advances technology makes there are ways around it. Hackers can be ruthless at cracking codes, finding backdoors, and tactics in fooling secure systems. Google is the largest and most powerful search engine and surprisingly in addition to the information it shares about you on the Internet there is a lot of information that not shared. When using the Google search engine your search history reveals a lot about you like your beliefs, associations and other personal information. Anytime that you are visiting websites cached copies of those sites are saved and your activities links to they call “Internet identity” and remains the Google database for a very long time. Bluetooths have proved to be a helpful device for cell phones and hackers now have found ways to them in stealing people’s information. Many of the new cell phones have Bluetooth by for uses like wireless headsets, in-car connectivity, and syncing for your computer. This device allows hackers to do many things with this automated process being so simple in just walking around for as long periods of time collecting as much data as possible and then manipulate it. After the software hackers use searches and connect to a susceptible Bluetooth capable cell phone and began to download things like information from your address book, daily agendas and information off SIM card by phone calls using hacked device and bug phone. Lastly and you now would probably think different about this particular device a GPS. OnStar’s GPS systems now have the ability to collect your GPS location information and speed at any time for any purpose. OnStar now has abilities in the selling of personal information and other information to third parties which included any type of law enforcement. To make matters worse after