SPAMS, SCAMS, & DAMNS

 

Image by Riki32 from Pixabay

SPAMS, SCAMS & DAMNS (WORK IN PROGRESS)

 The age of IoT has brought in the next-gen space in technology. However, it has also opened up a can of worms/pandora box to ever expanding spams, scams and more.  Further, depending on who is involved, it becomes a great strategy or a scam. For example, a government or those who control the government to justify snooping into personal information can legalize ISP selling personal data, and as it comes from the government, it becomes a great strategy, which then sets a precedence for every other organization to track and snoop into privacy.

 
 
Timeline: 
Our original video made on June 2nd
This video aired on NBC on June 7th
https://m.youtube.com/watch?v=mPU0WNUzsBo
 
originally shared here

 As per EFF, Comcast, has a very low rating for privacy.  Please also see some historical account of issues involving this ISP provider.
 

 
 
These issues further aggravate when the ISP owns a media company and outsource the research center to a country with higher corruption rates, poor HR and privacy practices,  and no direct connection to business products of this entity. Then, when such entities has the ability to get unwarranted and unaccounted amounts of debt in forms such as PPP, Insurance  and more, think about the level of power such entities would have. By the way, this is what is called the "Process Mapping".

Please note that though this reference pertains to a specific ISP, this market is a pseudo-monopoly, and there is not much difference among different players. If you were to search the forums, the complaints would be very similar across board.
 
To give another specific example, let us say that you contact your family member to find out whether a gift card would be an option as a birthday gift through messaging and over the phone. Immediately, within a short span in time, you can get an email from a credit card company acting as if they are a concerned entity sharing information on gift card frauds. If you were to check email communications prior to it, there would be none other the monthly balance summary emails. What is the big deal in this case? This example might not be a concerning one as we can discard the email, however, what if our conversations are tracked about, let us say, an action that we are planning to take for injustice met. Those with resources and ability to track that information can attack you in an preemptive manner. There is nothing new in this preemptive attack, but the IoT offers those with resources and reach to collude and  to attack so fast, that it does not give sufficient time for those with limited or not much resources to counteract right away.  If such actions continue and increase, it is a matter of time before the wealth gap would further widen, and the world of crooks would expand further.