{"id":12,"date":"2012-11-28T23:17:38","date_gmt":"2012-11-28T23:17:38","guid":{"rendered":"http:\/\/blogs.scu.edu\/fluebug\/?page_id=12"},"modified":"2012-12-10T16:31:13","modified_gmt":"2012-12-11T00:31:13","slug":"internet-tracking","status":"publish","type":"page","link":"https:\/\/blogs.scu.edu\/fluebug\/internet-tracking\/","title":{"rendered":"Internet Tracking"},"content":{"rendered":"<div id=\"attachment_59\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"http:\/\/blogs.scu.edu\/fluebug\/files\/2012\/11\/images.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-59\" class=\"size-thumbnail wp-image-59\" src=\"http:\/\/blogs.scu.edu\/fluebug\/files\/2012\/11\/images-150x150.jpeg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><p id=\"caption-attachment-59\" class=\"wp-caption-text\">Secret Tracking. <a href=\"http:\/\/t2.gstatic.com\/images?q=tbn:ANd9GcQ1SCbTGBAX7DIjOhmr6O5ChaA6SnFE29cxpa90vdHkfUDh8Zdh0A\">Source: G Static<\/a><\/p><\/div>\n<p>If you have access to the Internet, then you can be tracked. \u00a0The majority of people don&#8217;t realize how easy it is to be tracked online. \u00a0These types of tracking are used to mark patterns and trends of a persons online behavior. \u00a0Companies track you so they can then provide you with target advertising, to later sell your information to other companies so they can do the same. \u00a0The level of information gathered online is x10 compared to a basic telemarketing technique. \u00a0You know, those annoying junk mails you get at home, or the telemarketers that call your home.<\/p>\n<p>Being tracked online can be as simple as targeted ads. \u00a0However, there are ways when being tracked can negatively effect you. \u00a0The information being collected about your personal life and Internet activities can ultimately be used against you if ever needed. \u00a0Once you submit anything to the Internet, it is there forever. \u00a0Even if you delete it, somewhere it still exists.<\/p>\n<blockquote><p>Tracking companies build detailed, hidden online profiles out of your browsing activities over time, like the sites you visit most often, the things you buy and click, and your GPS location. They correlate that with other personal information you\u2019ve provided offline for things like account signups, rebate cards, vehicle registrations, and marriage licenses. It\u2019s all bought and sold in \u201cgrey markets\u201d for personal data that you can\u2019t see or access. \u00a0The end result: and you may never know why you\u2019ve been turned down for that car loan, a better job, a dating site, or a new credit card provider. \u00a0&#8211; Sara Downey, author of The Privacy Blog<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>How you can be tracked online<\/p>\n<p><a href=\"http:\/\/www.abine.com\/tracking.php\">Cookies<\/a>:<\/p>\n<p>Are small pieces of data that are stored on your computer after you visit websites.\u00a0 Visiting websites \u201cflag\u201d your<\/p>\n<p>computer with a cookie that is later used to re-identify your computer.<\/p>\n<p>It is like when you log into an account, you press the \u201cRemember Me\u201d button, except cookies are hidden.\u00a0 Cookies are also the past websites that pop up when you type in the address bar.\u00a0 Cookies allow websites and advertising networks to know when you have visited other sites in their network.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.abine.com\/tracking.php\">IP Address<\/a>:<\/p>\n<p>With your IP address, websites can 1) determine your geographic location down to the level of your zip code, and 2) keep track of all connections from the same IP address. If your IP address doesn&#8217;t change, then they have a good idea that it&#8217;s you every time you visit.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.abine.com\/tracking.php\">Web Bugs<\/a>: are invisible and embedded into a website\u2019s HTML to track the details of your visit (who is viewing the page, when, &amp; from what IP address).\u00a0 Web Bugs can track you as you move from one website to another within their network.<\/p>\n<p>** JavaScript trackers, SRC tags, Browser fingerprinting<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.abine.com\/tracking.php\">Browser History<\/a>:<\/p>\n<p>Networks make a list of the websites they are interested in following.\u00a0 These networks can find out whether or not you have visited those websites through browsing history through JavaScript or Cascading Style Sheet.<\/p>\n<p>&nbsp;<\/p>\n<p>Track from you iPhone:<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_60\" style=\"width: 160px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/blogs.scu.edu\/fluebug\/files\/2012\/11\/do-not-track-destroys.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-60\" class=\"size-thumbnail wp-image-60\" style=\"border-style: none;border-color: initial;cursor: default;border-width: 0px;padding: 0px;margin: 0px\" src=\"http:\/\/blogs.scu.edu\/fluebug\/files\/2012\/11\/do-not-track-destroys-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><p id=\"caption-attachment-60\" class=\"wp-caption-text\">Do Not Track. Source:\u00a0<a href=\"http:\/\/venturebeat.files.wordpress.com\/2012\/09\/do-not-track-destroys.png?w=558&amp;h=9999&amp;crop=0\">Ventura Beat<\/a><\/p><\/div>\n<p>Apple\u2019s iAds target their\u00a0ads based off of your Safari <a href=\"http:\/\/www.huffingtonpost.com\/2012\/10\/12\/iphone-privacy_n_1961400.html\">history<\/a>.\u00a0 You do have the option to turn off the iAds, however Apple buries the \u201coff\u201d switch deep in the phones preferences.Also, unless you turn off the \u201c<a href=\"http:\/\/techdiem.com\/2012\/10\/09\/heres-how-to-get-advertisers-to-stop-tracking-you-on-your-iphone-aapl\/\">Do Not Track<\/a>\u201d feature on your iPhone websites have the ability to track you both on their page and on other websites that you visit while online.\u00a0 They can even track you after you exit the website.Another way to use tracking on your iPhone is by using the GPS feature. \u00a0Your iPhone can serve as a real-time GPS tracking device. The person holding the phone can be tracked, pinpointed on a map, and not even know it. \u00a0If the person tracking does not own the phone being tracked, that is extremely immoral and illegal in certain states. \u00a0The app &#8220;<a href=\"http:\/\/ipod.about.com\/od\/usingios4\/ht\/Use-Find-My-Iphone-To-Locate-Lost-Or-Stolen-Iphone.htm\">Find My iPhone<\/a>&#8221; allows the tracking to happen. \u00a0 \u00a0 \u00a0 The catch is that the phone being tracked has to be within a Wifi enabled area.<\/p>\n<p>&nbsp;<\/p>\n<p>If after reading this page you feel that you are uncomfortable with the amount of exposure you give off while online&#8230; There are <a href=\"http:\/\/www.abine.com\/blog\/\">ways<\/a> to <a href=\"https:\/\/www.abine.com\/marketing\/deleteme\/signup\/index.php\">minimize<\/a> companies from <a href=\"http:\/\/www.nytimes.com\/2012\/09\/16\/technology\/in-microsofts-new-browser-the-privacy-light-is-already-on.html?pagewanted=all&amp;_r=0\">tracking<\/a> you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have access to the Internet, then you can be tracked. \u00a0The majority of people don&#8217;t realize how easy it is to be tracked online. \u00a0These types of tracking are used to mark patterns and trends of a persons &hellip; <a href=\"https:\/\/blogs.scu.edu\/fluebug\/internet-tracking\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":315,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/users\/315"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":11,"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":98,"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/pages\/12\/revisions\/98"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/fluebug\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}