{"title":"跟踪你的一举一动——今天和明天","authors":"Jakob Eriksson","doi":"10.1109/PERCOMW.2015.7134072","DOIUrl":null,"url":null,"abstract":"Not too long ago, tracking the movements of individuals was an obscure activity largely reserved for detective novels and the occasional creepy stalker. Lately, however, massive-scale continuous location surveillance has quietly become a fact of life, pursued by organizations as diverse as Google, Amazon, the Drug Enforcement Agency, and the Department of Transportation, not to mention cyber-criminals, jealous spouses and helicopter parents. An equally wide range of technologies is used for this virtual stakeout job, including spyware on your laptop and mobile devices, roadside radio receivers (Wi-Fi, Bluetooth and more), license plate reading devices, face-recognizing surveillance cameras, RFID tags and readers, and more. In this keynote lecture, we will review some of the more pervasive people-tracking methods in use today, together with some of their more (or less) well-known uses. We'll then put on a pair of decidedly rose-colored glasses, and try to see what good our Orwellian future may bring, and what challenges lie ahead, beyond the quaint notion of protecting your location privacy.","PeriodicalId":448199,"journal":{"name":"PerCom Workshops","volume":"455 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tracking your every move - Today and tomorrow\",\"authors\":\"Jakob Eriksson\",\"doi\":\"10.1109/PERCOMW.2015.7134072\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Not too long ago, tracking the movements of individuals was an obscure activity largely reserved for detective novels and the occasional creepy stalker. Lately, however, massive-scale continuous location surveillance has quietly become a fact of life, pursued by organizations as diverse as Google, Amazon, the Drug Enforcement Agency, and the Department of Transportation, not to mention cyber-criminals, jealous spouses and helicopter parents. An equally wide range of technologies is used for this virtual stakeout job, including spyware on your laptop and mobile devices, roadside radio receivers (Wi-Fi, Bluetooth and more), license plate reading devices, face-recognizing surveillance cameras, RFID tags and readers, and more. In this keynote lecture, we will review some of the more pervasive people-tracking methods in use today, together with some of their more (or less) well-known uses. We'll then put on a pair of decidedly rose-colored glasses, and try to see what good our Orwellian future may bring, and what challenges lie ahead, beyond the quaint notion of protecting your location privacy.\",\"PeriodicalId\":448199,\"journal\":{\"name\":\"PerCom Workshops\",\"volume\":\"455 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PerCom Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PERCOMW.2015.7134072\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PerCom Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2015.7134072","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Not too long ago, tracking the movements of individuals was an obscure activity largely reserved for detective novels and the occasional creepy stalker. Lately, however, massive-scale continuous location surveillance has quietly become a fact of life, pursued by organizations as diverse as Google, Amazon, the Drug Enforcement Agency, and the Department of Transportation, not to mention cyber-criminals, jealous spouses and helicopter parents. An equally wide range of technologies is used for this virtual stakeout job, including spyware on your laptop and mobile devices, roadside radio receivers (Wi-Fi, Bluetooth and more), license plate reading devices, face-recognizing surveillance cameras, RFID tags and readers, and more. In this keynote lecture, we will review some of the more pervasive people-tracking methods in use today, together with some of their more (or less) well-known uses. We'll then put on a pair of decidedly rose-colored glasses, and try to see what good our Orwellian future may bring, and what challenges lie ahead, beyond the quaint notion of protecting your location privacy.