1 00:00:00,360 --> 00:00:05,300 Spokeo does come also a search engine works in a similar way. 2 00:00:06,720 --> 00:00:14,190 Let's type in David this time Spokeo Dotcom's mechanisms are similar to those implemented in KGB people 3 00:00:14,190 --> 00:00:17,210 dot com. 4 00:00:17,240 --> 00:00:22,130 It's a free Internet service which checks social networking sites and traditional search engines for 5 00:00:22,130 --> 00:00:27,370 submitted criteria such as first and last names and email addresses. 6 00:00:29,180 --> 00:00:34,910 The site returns geographical locations connected to the person records of their media appearances and 7 00:00:34,910 --> 00:00:36,870 the pictures and videos they've uploaded. 8 00:00:39,260 --> 00:00:41,330 We've talked about I can stalk you before 9 00:00:44,330 --> 00:00:47,020 after year of running the service had been closed. 10 00:00:48,660 --> 00:00:51,420 Now this is what the site looks like. 11 00:00:51,540 --> 00:00:53,140 It's still worth visiting though. 12 00:00:53,400 --> 00:00:57,730 For example to read up on how to disable geotagging on your smartphone 13 00:01:00,500 --> 00:01:06,740 in the year that the site was up millions of people had been located using I can stock you. 14 00:01:06,830 --> 00:01:10,080 There are also a lot of services that make money out of invading your privacy 15 00:01:12,680 --> 00:01:19,910 services like read notify dot com or my life dot com intrude on your privacy by breaching the confidentiality 16 00:01:19,910 --> 00:01:24,310 of your emails and discussions you hold. 17 00:01:24,340 --> 00:01:25,700 Let's see how they work. 18 00:01:27,440 --> 00:01:30,880 Let's start with my life dotcom. 19 00:01:30,900 --> 00:01:34,800 You can only access the service fully after you've registered. 20 00:01:35,040 --> 00:01:41,760 After submitting a first and last name a long list of found people is displayed. 21 00:01:41,980 --> 00:01:46,340 The list features pictures ages and locations. 22 00:01:46,470 --> 00:01:53,990 You can even contact people via email a full profile on records on the selected person will be available 23 00:01:53,990 --> 00:01:55,560 after paying a monthly fee. 24 00:01:57,060 --> 00:02:00,640 As you can see it's a hard job maintaining your privacy on the Internet. 25 00:02:07,630 --> 00:02:10,370 Well tago is the last of the services I'd like you to know about 26 00:02:12,920 --> 00:02:17,750 rediscuss search engines to make you realize how much of people's personal information is out there 27 00:02:17,750 --> 00:02:18,560 on the Internet. 28 00:02:22,310 --> 00:02:28,840 Now let's see how these personal records can be exploited while Tigo is a tool for exploring data. 29 00:02:29,960 --> 00:02:36,290 I suppose you could call it a data mining to use the noncommercial version 3 or 4 of the application 30 00:02:38,580 --> 00:02:45,660 let's say we're interested in the intill dot com domain we'd like to find out if this business address 31 00:02:45,660 --> 00:02:48,050 has been given in social networking services. 32 00:02:50,530 --> 00:02:57,800 Tigo and any starting point can be transformed to find a range of information on a given object. 33 00:02:57,970 --> 00:03:04,290 One of the options available in the tool is to search for email addresses running this option brings 34 00:03:04,290 --> 00:03:05,690 up initial results. 35 00:03:08,290 --> 00:03:15,110 Assume you like to get in touch with someone who works for company X calling the company won't do much 36 00:03:15,110 --> 00:03:18,840 good since giving out employees e-mail addresses is against privacy policy 37 00:03:22,620 --> 00:03:26,890 by submitting a company's domain name as a question and not to go. 38 00:03:26,950 --> 00:03:33,680 You can learn the e-mail address is used by the company's employees and found out it can be the starting 39 00:03:33,680 --> 00:03:35,220 point of another action. 40 00:03:36,530 --> 00:03:42,150 If the starting point is the name of a person you can run actions to find their address. 41 00:03:42,150 --> 00:03:44,400 People that e-mail or their myspace account 42 00:03:48,000 --> 00:03:49,890 before we move on to cyber criminals. 43 00:03:49,890 --> 00:03:55,450 I'd like to mention another aspect of social media security. 44 00:03:55,560 --> 00:03:59,580 There's a tool called Facebook Blaster pro. 45 00:03:59,660 --> 00:04:06,840 It's a commercial software used for sending spam it targets fans of celebrities and other famous people. 46 00:04:08,510 --> 00:04:14,470 As you know celebrities have fan pages on Facebook. 47 00:04:14,620 --> 00:04:19,960 The Justin Bieber fan page for example has more fans on Facebook than there are people in Norway and 48 00:04:19,960 --> 00:04:21,360 Ireland put together. 49 00:04:22,690 --> 00:04:25,150 How can you send e-mails to this many people. 50 00:04:26,730 --> 00:04:30,440 Mine uninstall Facebook Blaster Pro. 51 00:04:30,620 --> 00:04:36,970 The people you want to send spam to don't have to be your Facebook friends. 52 00:04:37,000 --> 00:04:39,330 It's enough that you like the same fan page. 53 00:04:41,790 --> 00:04:49,710 Facebook Blaster pro will extract the email addresses of all fans and send them to you as you can see 54 00:04:49,740 --> 00:04:54,980 the program is advertised as a great marketing tool that can boost sales. 55 00:04:54,990 --> 00:04:59,090 It claims that it's the perfect tool for telling a broad audience that you've written a book.