Snapchat Ghost Mode – and how to protect your child from snap stalkers

Technology shifts and changes so quickly that it can be hard to keep up. Almost every day there are updates to your computers, “patches” to fix software, improvements to the apps on your phone and more. If you are like me, you’ll have automatic updates on so that these changes take place in the background – often overnight – so that when you turn on your device for the day – voila! – new improvements at your fingertips.

But not all updates are created equally – or with your best interests in mind.

A recent Snapchat upgrade added a new feature – Snap Maps. It’s a way to “view Snaps of sporting events, celebrations, breaking news and more from all across the world”. Sounds great, right?

But it’s also a way for you and your friends (or the general Snap user) to share your location with each other. So now, if you are wondering where your friends are and what they are doing, you can seek them out.

It’s super easy to use, just open the Camera screen and “pinch out” like you are zooming out from a photo and Snap Maps will be activated.

From the map you can see snaps from interesting locations and events as well as photos of people that you know or are connected to.

But isn’t that stalking?

It’s rather cool that you can see where your friends are. In fact, Google has variations on this functionality in its maps – and even had the standalone product, Latitude, until it was closed down in 2013. At the time, I had concerns with Latitude and with the data that we uncaringly share with the people who make our phones and create the apps we run on them – and so too do I have concerns with Snap Maps.

Don’t get me wrong, as a marketer, location information can be super useful. And as a person with friends all around the world, I get a particular kick out of knowing where my friends and connections are and what they are doing.

For example, I know my friend Suzanne is travelling in the US at the moment. Thanks to Snap Map I now know that she was just on Mariposa Street in San Francisco. No doubt checking out the local fried chicken shops.

That’s kind of fun. But as a consumer it makes me nervous.

We know that on social media, the concept of “friendship” is fairly loose. There will be a lot of randomness in your friend list – plenty of people who you don’t know, have never met, and probably wouldn’t invite to your home to stay for the weekend. Yet, you can trust them with your location, each and every second of the day.

A warning for parents

As adults, we can make choices about who shares our personal information, location and so on. But parents with children who use Snap Chat may not realise what has become available with the new Snap Map functionality. In fact, most parents won’t know that some children have open privacy settings meaning that anyone can “friend” and connect/share information with them without asking.

Imagine, for example, your child has a group of friends who use Snap Chat to share photos, chat and keep connected outside of school. Then imagine that there’s an incident – like some bullying or bad behaviour – a falling out of some kind.

Thanks to Snap Maps, all your child’s connections (including the bully) will know where your child is whenever they are logged in.

No doubt, parents have asked their children about their connections and “friends”, and have received assurances that “no, I don’t add people I don’t know” … but words and actions are sometimes strangers. In this video, Joey Salads conducts a Snap Map stalking experiment with the parent of a young girl. The results are compelling.

Turn on Ghost Mode to protect your Snap Chat privacy

The only way to stop your location being shared across your Snap Chat network is to enable “Ghost Mode”. You will be prompted for location sharing the first time you upgrade to Snap Maps, but you can also edit your privacy settings later.

If you have children, I’d recommend you enable Ghost Mode immediately. In fact, unless you’re confident that you know your connections well, I’d enable ghost mode on every device. Being location aware can be useful, but data sometimes reveals more than we expect – and there’s no reason for us to turn a blind eye to it.

When the App is Free, You are the Product. Swipe Buster Brings a New Level of Reality

How often to we blithely click “ACCEPT” on the terms and conditions of a new website or app, hungry to explore the digital domain before us? How often do we happily hand over personal information without a second thought?

In the world of social media, it is claimed that we have come to a grudging acceptance that the utility of platforms like Facebook or Twitter far outweighs the cost to our privacy. But is this true? Is it simply the case that we have not yet experienced the full impact of our decisions? Sure we have advertising. Targeting. Remarketing. Automation and nurturing. And more.

But what happens when our private information is available at a fee. To any buyer?

New app, Swipe Buster now lets you find out if someone is using the dating app Tinder. You could, for example, enter your partner’s details – and for $5 tap the Tinder API to reveal the answer. Of course, you could also use Swipe Buster for more mischievous purposes.

SB-Anim

In this world of ever increasing transparency, privacy and cyber security is becoming a hotter and hotter topic. I have said previously that cyber security is now part of your brand – but it goes further than this. HOW you choose to commercialise “your” data can radically impact the lives of your customers.

There is no doubt that “we” are the product being sold across an infinite web of social connections. In aggregate this may not worry us too much. But as more of these kind of platforms emerge, seeking to monetise the vast data in storage, we may well regret our decision to accept those terms and conditions.

And those businesses that have built their valuations on public trust may find them suddenly friendless.

How to Make a Privacy Complaint

When Disruptor’s Handbook and Constellation Research hosted an evening meetup recently for the Australian launch of Ray Wang’s Disrupting Digital Business book, we were hoping to get some conversation going amongst the audience. We talked all manner of disruption – from innovation to technology, big data to marketing – and everywhere in between. But it wasn’t until we hit the topic of Privacy that debate really kicked off.

It was all in. Twenty or thirty of Australia’s leading business innovators held forth in open debate. And after an hour or so, we realised we’d only scratched the surface. There was plenty more work to be done.

And while there were contrasting views and concerns, one thing was clear. We are all now subject to much greater openness – and therefore at risk of some part of our privacy being compromised. So what are we to do?

The Office of the Australian Information Commissioner has created a great video to explain.

How to Remember Passwords Like Sherlock Holmes

One of the greatest challenges of the internet age has nothing to do with technology and everything to do with being human. It is the act of remembering passwords.

There was a time – and yes it was a simpler time – when we really only needed to remember one or two passwords. There was a personal identification number (PIN) for our ATM cards and then a password for our email. Then along came internet banking. For all of our bank accounts. Logins for news sites. Websites. Shopping accounts. We setup profiles on sites like Kiva for charity, registered for various frequent flyer programs, free email accounts and games. On top of that are cornerstone accounts – the Apple iTunes account and your Google Account are controlled by a single ID that is linked across a variety of services – but that integration was rolled out over time.

By the time that social networks came along, we already had dozens of user IDs, a handful of email addresses and profile and accounts scattered across the web.

To make matters worse, each of these sites has its own standard for password strength. Some sites require complex passwords incorporating non-standard letters or numbers or capitalisation. Some sites require all of these. For online transactions, financial institutions require two factor authentication (but only some) – requiring two stage combinations before providing you access. This can include your standard account ID and password along with an SMS code or a picture puzzle displayed on-screen.

All of these variations have to be remembered. Or documented somewhere secure. Accordingly, our ability to remember passwords has become big business – with service and platform providers offering to help us “manage” the mess we have found ourselves in. Sure, many of our web browsers “remember” our account details for us, but what happens when you login from your phone and not your computer? What happens when you login with your home PC and not the laptop you use for work?

It doesn’t matter if someone hacks an account?!

Many people believe that it doesn’t matter if an account is hacked. For example, you could have an old email account hacked and not know it. What happens? Here are a few scenarios to consider:

  1. Your email account is quickly scanned / searched for user IDs or passwords (like account confirmations)
  2. This information is fed into the hackers computer to test out on sites across the internet. This is automated and means that hundreds of attempts / variations can be made in minutes.
  3. The process is repeated with each success – with more information gradually being built up around your profile, access etc
  4. If credit card or bank account numbers are found – then these can be quickly shared, sold on or used as currency in their own right
  5. Small charges can begin appearing on your statements without your noticing, gradually escalating in size
  6. In worst case scenarios, your accounts can have passwords changed and address details altered

There are a series of approaches that can improve your password security – and they are relatively simple to implement:

  • Create your own tiered security:
    • Tier 1: Make a list of your high risk accounts – bank accounts, email, online payments like PayPal or Amazon, social media
    • Tier 2: A list of less risky accounts where no confidential information is kept.
  • Create complex passwords for Tier 1 accounts – each account should have a UNIQUE password
  • Use password managers to store and remember your details
  • Delete the spreadsheet on your PC desktop that stores all your passwords (yes, I know you have one)
  • Reset or change passwords regularly.

Is there another way?

Fans of Benedict Cumberbatch’s Sherlock Holmes will have seen the intense visual approach that the Holmes character uses to remember complex pieces of information. Called the Mind Palace, it involves visualising a complex place in which you can “physically” store your memory. Then by embellishing the location with story, the item to be remembered is reinforced and supposedly easier to recall.

If you really want to be safe on the internet, try storing your passwords in a Mind Palace. Here’s an infographic showing how it works. Good luck!

Story-4-Taking-Back-Your-Privacy-Infographic-full-2

Time for Parents to Step Up as Digital Role Models

Working in digital and social media means you are often drawn into quite personal conversations with people. And by “conversations” I don’t just mean “discussions” or “chats” – but one way broadcasts where your only interaction may be to virtually “nod” (via a “Like”), acknowledge or amplify a situation (via sharing or a retweet). For while social media allows us to “engage” or interact with others, the vast majority don’t. Most of us are “lurkers”.

Lurkers are the 90% of people who use social media to observe. Watch. Listen in. It’s only 1% who create this content. We call this the 90-9-1 rule – or the “1 percenters”.

Participation-Funnel

You may only be “Friends on Facebook”, but this can expose you to a vast insight into a person’s life. For example, lurking you will learn about:

  • Private details – birthdays, relationships status, holidays, workplace, friends and networks
  • Lifestyle – favourite restaurants, foods, cafes, sports, hobbies, games
  • Travel – holiday destinations, desires, interests.

Social media reveals the pattern of your life

Now it all sounds innocuous enough, but think about all these pieces of information put together. What does it reveal? It reveals the pattern of your life. Every item that you post, share, click, promote and comment on can be found in your own feed. Perusing a Facebook profile page essentially provides a glimpse into your private world. For while you may feel that you are just sharing an inspirational quote with your loved ones, it generally means that you are sharing that quote with the friends of your friends. And in isolation you can easily ask – does this tell the “story of me” – and do I feel comfortable with strangers thinking that?

In fact, researcher Sam Gosling and author of Snoop – what your stuff says about you, uses his psychological framework, observation and analysis to explain how our small objects and personal spaces reveal a great deal about ourselves. While his research methodology centres on the analysis of personal bathrooms – his OCEAN framework has also been deployed as a Facebook technology to generate insights from Facebook profiles.

So when you see that 50 people have Liked one of your posts, the 1 Percenters rule suggests that more than 10x that number have “seen” it. And while this doesn’t mean that your update or profile has gone “viral”, it is far from private.

Think of the children

As an adult, this is not that frightening, right? But think of the role modelling that is taking place here. Especially for those who are parents – or who have high levels of interaction with children.

Telstra’s Cyber Safety – Balancing Screen Time Survey asked 1348 Australian parents of children aged 3-17 about their own use of devices. They also surveyed these parents on their children’s use of technology. The research revealed:

  • 65% of parents don’t think they’re good role models when it comes to device usage
  • 77% of parents considered putting controls on the device but 33% didn’t know what is available or HOW to implement it

It is that second bullet point that concerns me the most. Telstra provides Cyber Safety information available via their website, including links to:

  • eSmart – a cyber safety behaviour-change initiative of the Alannah and Madeline Foundation, aimed at schools and libraries
  • Smart Controls for customer mobile accounts that can create restrictions on devices
  • Online Security – tools for broadband customers designed to keep your family safe

In the survey, when children were asked about perceptions of their parents’ device usage, 12 per cent said the amount of time their parent spends on their device impacts how well they look after their family, and a further nine per cent say the amount of time their parents spend on their device takes away from their family time.

Telstra’s Cyber Safety Manager, Shelly Gorr, said:

The results are a reminder to parents that they’re a key influencer on their children’s online behaviour.

Moving beyond screen time

There are plenty of additional insights coming from the survey – especially around the often vexed subject of screen time. How much is too much? How do you manage it? Why should you? Most of this is subjective – and dependent upon your own style of parenting. And while there is a real risk related to screen time – there is also much hype, conflicted and skewed research supporting both more and less screen time for kids. But surely this is not  a question of technology – but a question of “what kind of family” and “what kind of adults” are you preparing for the world.

If it is time for parents to step up as digital role models, there’s also a need for support for those parents. We are currently putting together a simple online course for parents interested in protecting their family online – and managing the effects of screen time. If you are interested in this, sign up below and we’ll let you know when it is available.

Register your interest in cyber safety course



Who Needs Another Day in Password Land?

I have a sneaking suspicion that the most successful call to action in the world is Forgot Password?. That small link that sits below a password field is my friend. After all, I have passwords for every blog, social media site, news sites, business sites, bank, retailer and online tool or cloud provider that I use. The use of passwords is, in itself, a personal big data challenge that I have yet to solve.

I have a password manager on my phone, some of which is current. Some outdated, and some automated. I have a list which I keep which is slightly unreliable – mostly because I fail to manage it scrupulously. I have randomly scrawled password scattered through notebooks I can no longer find. There is encryption for the cloud (which also requires some kind of key) and there is even fingerprint identification that works with iPhone 5 (which is actually pretty convenient – even if slightly scary in terms of identity management/theft/security/tracking).

So I was interested to check out the new password manager from There’s Only 1 U. Actually, it was the video that tipped me over. Produced with a great sense of self-deprecation, it captures the frustration that many of us feel when it comes to password management and online security. To be honest, it’s a scene too long, but it did the trick.

Is it useful? I’ll let you know after some hands on use.

First indications are positive

Like most password managers, there’s some pain up-front to set up your sites and accesses, but the long term gain is what is on offer.

The UI and step-by-step setup is relatively straight forward, though very wordy. I was able to easily use the phone’s camera to scan my face and setup the security. There is something reassuring about scanning your own face as a secondary form of authentication. And so far, I have not been able to trick the scanner by using a photo.

There is a good selection of websites, apps etc that can be easily and quickly configured for access. And it’s relatively easy to add your own custom sites using the same process. Of course, you can still use Touch ID or you can use the facial recognition engine.

But the question is traction. Will I use it again? Will I uninstall? Will I just forget about it? Ask me again in a week. In the meantime, register for the app here or get more information about it here on their website.

One Privacy Act to Rule them All

Reform to Australia’s Privacy legislation began in 2004 – and as of tomorrow, 12 March 2014, there will be a raft of changes to the way in which our privacy is regulated. The Australian Privacy Commissioner, Timothy Pilgrim, provides a high level of overview of the changes in this video.

Australian Privacy Principles

The changes that come into effect tomorrow, include a set of 13 new harmonised privacy principles that regulate the handling of personal information by Australian and Norfolk Island Government agencies and some private sector organisations. These replace the national privacy principles and the information privacy principles that were previously in place. In particular, the following principles apply to marketers:

  • Direct marketing: Australian Privacy Principle 7 (APP7) relates to direct marketing. Where you hold personal information about an individual, this principle covers the manner in which that information can be used (or not) for direct marketing purposes
  • Cross-border disclosure of personal information: Australian Privacy Principle 8 (APP8) covers the sharing of personal information with an overseas entity. This will apply where you are capturing or sharing information with overseas providers.

Who do the APP apply to?

The short answer is government agencies and organisations with over $3 million in annual turnover – but be sure and check the details:

The APPs cover the collection, use, disclosure and storage of personal information. They allow individuals to access their personal information and have it corrected if it is incorrect. There are also separate APPs that deal with the use and disclosure of personal information for the purpose of direct marketing (APP 7), cross-border disclosure of personal information (APP 8) and the adoption, use and disclosure of government related identifiers (APP 9).

The APPs generally apply to Australian and Norfolk Island government agencies and also to private sector organisations with an annual turnover of $3 million or more. These entities are known as ‘APP entities’. In addition, the APPs will apply to some private sector organisations with an annual turnover of less than $3 million, such as health service providers. More information is available on the Who is covered by privacy and the Privacy Topics — Business pages.

The APP checklist

What has changed and what do you need to review?

Take a look at the Privacy Act Reform Checklists for organisations (yes, that’s you if you run a business with turnover > $3 million) and government agencies.

Get reviewing now

Remember, the changes come into effect tomorrow. So you’d best get started on that review ASAP!

Private Area Grant Hutchinson via Compfight

When Big and Data got together, it was love at first Like

Breathless. Heart beating. We all know the feeling. It’s all heart, feeling, emotion. We’re waiting for the brain to kick in – but there is no relief. It’s really a sign of madness.

Love is merely a madness: and, I tell you, deserves as
as well a dark house and a whip, as madmen do: and the
reason why they are not so punished and cured, is, that
the lunacy is so ordinary, that the whippers are in love too.
— Shakespeare, As You Like It, 3.2

But these days, meeting and falling in love is not just a physical thing. It’s virtual … and played out on social networks.

Facebook-Love

The Facebook data science team has been digging through the mountains of interactions that take place between people before, during and after they fall in love. They looked in detail at the number of posts exchanged going back to 100 days before the “couple” changed their relationship status from “single”. What they found was that social media interaction plays an important role in the formation of the relationship:

When the relationship starts (“day 0”), posts begin to decrease. We observe a peak of 1.67 posts per day 12 days before the relationship begins, and a lowest point of 1.53 posts per day 85 days into the relationship. Presumably, couples decide to spend more time together, courtship is off, and online interactions give way to more interactions in the physical world.

And this is where big data gets interesting. We are now starting to see digital traces of behaviours that have real world impacts. The things that we do and say online can be correlated across thousands of data points to reveal actions that take place in our so-called “real lives”. But where does it go from here?

  • Social lifestyle mapping: Facebook (and other collectors of big data) can map and improve personas, track shifts and changes in community trends and lifestyles over time
  • Predictive targeting: With social lifestyle mapping in place, algorithms can be used to predictively target individuals and groups with relevant information. This could take the form of advertising, public health messaging/recommendations, career suggestions and so on. In fact, the possibilities are endless
  • Location awareness: As a large number of Facebook interactions take place on mobile devices, location awareness can add a greater degree of relevance to any of these predictive or realtime offers.

High level barriers:

There are some immediate barriers to usefulness that spring to mind:

  • Brands are slow to catch and embrace technology innovation: Facebook (and indeed Google) have a great deal of work ahead to prepare brands and governments for the power and opportunity that this presents. Thus far we’ve seen precious little in the way of focused education and leadership in this area and without it, organisations simply won’t be prepared (or interested) in this
  • Organisations lag in digital transformation: For these opportunities to be embraced, most organisations have to undertake digital transformation activities. Ranging from change management and education to strategy, business system overhauls and process improvement, digital transformation is the only way to unlock organisation-wide value – but few are seriously committed to such a program
  • Privacy is shaping up as a contested business battleground: Many governments, corporations and individuals fervently hang on to notions of pre-internet era privacy. Laws and regulations have struggled to keep pace with the changes taking place in our online behaviours. Meanwhile public and private organisations are conflicted in their use of, protection and interest in privacy. We’ll need to work through this to understand whether privacy really is dead.

Love´s in the air!! Muuuitos corações!!!! erika k via Compfight