Snap Map Analysis

Improved Essays
Smartphones create a “snap map” using our phones and any pictures we post online.
These pictures once online can be accessed by anyone with internet access and a device. NBC
Action News did a story on how these “snap maps” work and how they can be easily accessed.
The story revolved around a little girl whose mother posted pictures of her doing everyday activities such as going to school, the park, and even her favorite restaurant. These pictures were easily seen by the reporter who was conducting the story. Not only was the reporter able to see the pictures without permission but also able to pinpoint the exact locations of all the places the little girl regularly was at down to the exact area of the park she plays. The information was
showed
…show more content…
The “snap maps” work similarly to the handheld mapping services we use on our phones. This allows every picture to be tagged with the location it was taken and if posted on any site can show random people where the photo was taken without your knowledge.
We all think that our phones are only ours until they’re not anymore. Everything we do is saved to our phones whether we hit delete or not. There are dozens of apps that pull up deleted software we think is gone forever. There is always a copy of what we do in our hard drives. Even simple things like shopping online or using public Wi-Fi leaves us susceptible to viruses. If we have sensitive information on our phones and send them in to be fixed at the headquarters they look through every file to make sure of the source of the virus. Having information that you think is private becomes quite the opposite without any intentions for it to do so. Hackers can unleash a virus into your computer via Bluetooth, they just need access to the correct software and be roughly within 30 feet in order to infect your device and uncover every file you thought was

Related Documents

  • Decent Essays

    However, mobile devices can actually pinpoint your location using the built-in GPS. The advantages of mapping and location-based software are, simple to use, multiple destinations, selective travel type, man useful information, and the creation of customized maps. Some disadvantages include, limited accuracy, used…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Plain Search Case Study

    • 835 Words
    • 4 Pages

    4) Search in Plain View Search in plain view is when a police officer finds some unexpected suspicious items, he has the right to seize them without a search warrant. In digital evidence, police officers are usually not the people who found suspicious files, this is more likely to be a server admin in organization or technician who repair digital devices for his clients. In the past few years, there are many cases that illegal data are found in computers or other digital devices accidentally, such as Corey Beantee Melton’s case, reported by Hill,k from Forbes. He left his laptop to Bestbuy’s geek squad to repair, then some files with suspicious names are found, so they contacted with local police office, since this is under plain view, police officer seized the laptop and later applied for search warrant, at the end, Melton is found guilty.…

    • 835 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Privacy is Publicity Imagine being constantly watched. Everything you do, from the words you speak and places you go, to the thoughts you think, are constantly being documented, inspected, and analyzed. This was daily life for the characters in the dystopian society of Oceania. The level of surveillance portrayed in George Orwell’s novel 1984, is not as extreme and far off from our daily lives in 2018 as the reader may think.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Distracted driving, whether it be texting, talking on the phone, or something as absurd as reading the newspaper creates many problems on the road. Salvucci and Taatgen (2011) of The Oxford University Press bring up an interesting observation of how most people readily agree that when drivers stop looking at the road, their performance severely suffers. This statement, without distinction of any specific activity that the driver might be participating in, makes for a relatively true observation – but when the activity is clarified to be texting while driving, the tone might change. When someone steps into the driver’s seat of a car, they take on the responsibility of driving with care and safety, because it’s not just their lives that are thrust…

    • 1949 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Map Questions

    • 1563 Words
    • 6 Pages

    Read pages 482-485 Focus Question (page 482): The admission of new states to the Union fueled the debate by interrupting the balance between the number of slave states and free states. According to the textbook, it states, “[T]erritory gained by the Mexican-American War threatened to destroy the balance.” In the senate this would mean one side would have more power than the other due to popular vote. Both the North and South were opposed to this idea resulting in the debate.…

    • 1563 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    When I get into my car every morning, I connect my phone to the radio via Bluetooth. I cannot drive without music. After I’ve selected the playlist I feel that day, I put my phone down to back out of my driveway, but it’s already taken some of my concentration before I reach the first stop sign. I got a text message. Like most of us, I have to check it, but I’m careful, so it’s safe, right?…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Audience Analysis - SEE-USA In May of 2012, I was an intern at Sakura Educational Exchange USA (SEE-USA). SEE-USA is a non-profit international student exchange organization that seeks to promote culture exchange between the United States and Japan. SEE-USA helps Japanese high school students learn about American culture by allowing students to visit the Amish and spend one day in an American high school. During these visits, the Japanese students spread Japanese culture to the American community by teaching children origami.…

    • 912 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Essay On Dystopian World

    • 600 Words
    • 3 Pages

    By entrusting such important data with the government distrust spreads. The use of technology ruled by higher individuals is questionable on the safety for each person in the long run. Their entire history is easily accessible at all times and leaves nothing…

    • 600 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    INTRODUCTION By taking the present condition of the all the industries in India one of the top leading industries in the present scenario is telecommunication industry of India. The expansion and growth of this industry has been seen since the last 50 years and every consecutive year its increasing more and more. Nowadays, every person is aware about a mobile phone be it a normal grocery vendor or a big business tycoon. Everybody knows how to operate a mobile phone.…

    • 1476 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays