Jon Schwartz of USA Today reported:
In snooping on a reporter to pinpoint internal news leaks, Hewlett-Packard used high-tech tools common to spammers, phishers, retailers, suspicious employers and investigators.USA Today story, here.
Those tools, including phishing-style e-mail and tracing software, underscore the growing use of electronic surveillance to monitor consumers' every digital move, computer-security experts say.
Misleading e-mails from HP investigators to CNet reporter Dawn Kawamoto "smacked of phishing tactics" to trick her into divulging information, says Dave Jevans, chairman of the Anti-Phishing Working Group.
What the computer security experts might be referring to are "keyloggers."
If you would like to see how (anyone) can use this technology, link here.
Unfortunately, it doesn't take a private investigator, or computer security expert to electronically invade someone's privacy.
My question is - with the abuses of this technology - why is it legal?
No comments:
Post a Comment