Hacked.

Featured Image Ghost Writer (P365-336) by Steve Petrucelli (CC BY-NC-ND 2.0) 

Have you ever been hacked? Hacking is now the most common form of the distressing digital threat we now face in the digital age. As society uses many digital platforms, it is up to us to surveil and regulate our own usage to prevent hacking. Yes, that means surveilling our own digital platforms to prevent hackers from stealing or tracking our important information! Too often we see hackers on the news; hacking within the means of surveillance happens anywhere, everywhere, and in any way possible, it really is inevitable. Recent articles show the ways hackers can retain your information, such as government hacking, home surveillance  or even security cameras. If you are not careful, you will be HACKED.

Screen Shot 2017-09-07 at 2.30.21 pm.png
Camera03 by spideroncoffein (CC BY 2.0)

So how can we prevent or monitor hacking? As watched on The Project, a recent hacking scam is now being surveilled throughout Australia – and you can see if you have been hacked. The website haveibeenpwned.com, allows its users to check to see if they have been hacked! This is a fantastic website, as we can then further surveil our own accounts, and alter private information and passwords to prevent hacking.

Recently I watched a short video on Hacking, Espionage, And Surveillance (viewed 4 September 2017), this episode discusses the conception of surveillance and hacking in today’s society. Now, thanks to the internet hacking and surveillance is the wave of the future. As stated in the episode, “from your desktop, at the mere flick of a finger, you can access a website in Japan, read a South American newspaper, or make reservations at a restaurant in Paris. But what is easy for you from your home computer, is also easy for any malicious act who wants access to that computer or the networks it operates on” (Hacking, Espionage, And Surveillance, viewed 4 September 2017). This is a frightening statement, as the user may think they are conducting safe and convenient internet usage, yet anyone, anywhere with malicious intent can also surveil and access this private information and platforms you use on your home device. It really makes you wonder who is watching, who is surveilling and who is hacking…

Screen Shot 2017-09-07 at 2.37.21 pm.png
Palantír by Max Sang (CC BY NC-ND 2.0)

If hacking and surveillance is the way of the future, we have to start to understand the methods used, and why it really is so easy to be hacked while using the internet on our many digital devices. Fuchs states that, “in the old surveillance, it was more difficult to send data, whereas in the new surveillance this is easier.” Whereas, In traditional surveillance, “what the surveillant knows, the subject probably knows as well”, unlike new surveillance as the “surveillant knows things the subject doesn’t”.  According to Fuchs, new surveillance is not on scene, but remote, and states that it is “less coercive” and “more democratised” because some forms are more readily and widely available (Internet and Surveillance 2012, pp. 1-2)

 

Screen Shot 2017-09-07 at 2.45.32 pm.png
magic eye by SnaPsi Сталкер (CC BY NC-ND 2.0)

 

To take a closer look at the prevention of hacking (as it really is so easy for hackers to get ahold of personal information) and what you can do to surveil your many digital platforms that may be subject to hacking, have a listen to the below SoundCloud podcast.

 

Thanks for viewing,

-E

References

Fuchs, C 2012, Internet and surveillance : the challenges of Web 2.0 and social media, New York : Routledge, 2012.

Hacking, Espionage, And Surveillance n.d., n.p.: The Great Courses, 2016., DEAKIN UNIV LIBRARY’s Catalog, EBSCOhost, viewed 4 September 2017.

Featured SoundCloud Music: Covinos – The Come Down by La Musice (CC BY-NC-SA 3.0)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: